Chapter 12. Cyber Terrorism and Information Warfare
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
• Explain what cyber terrorism is and how it has been used in some actual cases
• Understand the basics of information warfare
• Have a working knowledge of some plausible cyber terrorism scenarios
• Have an appreciation for the dangers posed by cyber terrorism
Introduction
Throughout this book, various ways have been examined in which a person might use a computer to commit a crime. This book has also looked into specific methods to make a system more secure. One issue that has not been addressed is that of cyber terrorism. People in countries around the world have grown accustomed ...
Get Computer Security Fundamentals, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.