Talk With an Expert

Beyond Conventional Terrorism...The Cyber Assault

Beyond Conventional Terrorism...The Cyber Assault (PDF, 2.12MB)Published: 06 Apr, 2003
Created by
Rajeev Puran

The text presented in this practical write up is established to review the various intents, events, acts and possibilities of computing technology based terrorism and warfare. This paper will look at the broad range of cyber-terrorism and warfare as well as some intricacies. Cyber-terrorism is not necessarily a new frontier however today it is more eminent than ever. Cyber-terrorism has become a new vehicle for destroying economic, political, and sociological structures. As computers and networks become the very lifeline for every day function in America and abroad, there in lies a new avenue of exploitation by cyber-terrorists. This paper will look at environments that pose the greatest risk, profile information of who may be a threat, preventative measures and general classifications of attacks and the dangers that such attacks pose. It will briefly address the possibilities and links to human casualties of a cyber attack.

Beyond Conventional Terrorism...The Cyber Assault