After reading this chapter and completing the exercises, you will be able to do the following:
• Explain what cyber terrorism is and how it has been used in some actual cases
• Understand the basics of information warfare
• Have a working knowledge of some plausible cyber terrorism scenarios
• Have an appreciation for the dangers posed by cyber terrorism
Throughout this book, various ways have been examined in which a person might use a computer to commit a crime. This book has also looked into specific methods to make a system more secure. One issue that has not been addressed is that of cyber terrorism. People in countries around the world have grown accustomed ...