Chapter 12. Cyber Terrorism and Information Warfare
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Explain what cyber terrorism is and how it has been used in some actual cases
Understand the basics of information warfare
Have a working knowledge of some plausible cyber terrorism scenarios
Have an appreciation for the dangers posed by cyber terrorism
Introduction
Throughout this book, various ways have been examined in which a person might use a computer to commit a crime. This book has also looked into specific methods to make a system more secure. One issue that has not been addressed is that of cyber terrorism. People in countries around the world have grown accustomed ...
Get Computer Security Fundamentals, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.