answersLogoWhite

0


Best Answer

The cyber-terrorism has not begun in full-scale yet. We have seen some minor attempts to threaten functionality of certain servers, but what we really fear are attacks on critical infrastructure (such as water structures, food supplies, health care institutions), that could not only cost money, but also human lives. For example, imagine an outcome of a situation in which a terrorist succeeds in opening dams valve control.

User Avatar

Wiki User

16y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

Terrorism is a relative that cannot be defined easily as the phrase 'One man's terrorist is another's freedom fighter'. It means that terrorism is a ploy used by an oppressor to justify their actions to the oppressed

Use of force or threats to intimidate.

This answer is:
User Avatar

User Avatar

Wiki User

15y ago

Terrorism has started im many parts of the world. For instance: Ireland, Sri Lanka, Malaya, China, Algeria, Kenya.

This answer is:
User Avatar

User Avatar

Wiki User

14y ago

late 90s

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Where did cyber-terrorism start?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is cyberterrorism a felony or misdemeanor?

Cyber terrorism is a felony.


What has the author George V Jacobson written?

George V. Jacobson has written: 'Cybersecurity, botnets, and cyberterrorism'


What has the author Gabriel Weimann written?

Gabriel Weimann has written: 'Www.terror.net' -- subject(s): Cyberterrorism, Terrorism, Terrorists, Prevention, Internet


What has the author Heather Harrison Dinniss written?

Heather Harrison Dinniss has written: 'Cyber warfare and the laws of war' -- subject(s): Cyberterrorism, War (International law), Information warfare (International law)


What has the author Ryan Russell written?

Ryan Russell has written: 'Stealing the network' -- subject(s): American Short stories, Computer hackers, Computer security, Cyberterrorism, Fiction, Short stories, American


What has the author Michael Calce written?

Michael Calce has written: 'Mafiaboy' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Investigation, Biography, Computer security, Security measures, Prevention


What has the author Richard W Aldrich written?

Richard W. Aldrich has written: 'Cyberterrorism and computer crimes' -- subject(s): Computer crimes, Computer networks, Computer security, Information warfare, International cooperation, Security measures


What has the author Lech Janczewski written?

Lech Janczewski has written: 'Managerial guide for handling cyber-terrorism and information warfare' -- subject(s): Computer crimes, Cyberterrorism, Information technology, Information warfare, Management 'Internet and Intranet Security Management'


What has the author Salvatore J Stolfo written?

Salvatore J. Stolfo has written: 'Insider attack and cyber security' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Congresses, Computer security, Security measures, Prevention


Ano-anu ang ibat-ibang klase ng terorismo?

Domestic terrorism, International terrorism, State-sponsored terrorism, Narco-terrorism, Biological terrorism, at Cyberterrorism -source: Kasaysayan ng Daigdig: batayang Aklat sa Araling panlipunan Ikatlong taon


Is cyber terrorism illegal?

Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. an assault on electronic communication networks. In the related links box below, I posted the wikipedia article on computer crime.


What is cybeterrorism?

Cyberterrorism is where terrorists take control of one country's entire server network and crash it using a variety of methods, including, but not limited to: botnets, Trojan horse viruses. Once a cyberterrorist has control of a system they can take control of anything controlled by the internet, including the national power grid. They can also access anything that is connected to that network of computers, including home computers, but especially government computers.