X hits on this document

38 views

0 shares

0 downloads

0 comments

7 / 12

Cyber Terrorism

An effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world

Examples

Logic bombs used to destroy networks and systems

Communicate covertly around the world

Why?

An attack can strike directly at an economic target

No Borders of legal control

No need to infiltrate enemy territory, no loss of life

Growing number of highly skilled computer experts

Funds terrorist activities

Document info
Document views38
Page views38
Page last viewedSun Dec 11 10:39:27 UTC 2016
Pages12
Paragraphs123
Words518

Comments