The cyber-terrorism has not begun in full-scale yet. We have seen some minor attempts to threaten functionality of certain servers, but what we really fear are attacks on critical infrastructure (such as water structures, food supplies, health care institutions), that could not only cost money, but also human lives. For example, imagine an outcome of a situation in which a terrorist succeeds in opening dams valve control.
Terrorism is a relative that cannot be defined easily as the phrase 'One man's terrorist is another's freedom fighter'. It means that terrorism is a ploy used by an oppressor to justify their actions to the oppressed
Use of force or threats to intimidate.
late 90s
Cyber terrorism is a felony.
George V. Jacobson has written: 'Cybersecurity, botnets, and cyberterrorism'
Gabriel Weimann has written: 'Www.terror.net' -- subject(s): Cyberterrorism, Terrorism, Terrorists, Prevention, Internet
Heather Harrison Dinniss has written: 'Cyber warfare and the laws of war' -- subject(s): Cyberterrorism, War (International law), Information warfare (International law)
Ryan Russell has written: 'Stealing the network' -- subject(s): American Short stories, Computer hackers, Computer security, Cyberterrorism, Fiction, Short stories, American
Michael Calce has written: 'Mafiaboy' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Investigation, Biography, Computer security, Security measures, Prevention
Cyberterrorism is the use of technology to conduct terrorist activities, such as hacking into computer systems to steal sensitive information, disrupt critical infrastructure, or spread propaganda. It can have severe consequences for national security, economies, and public safety.
Richard W. Aldrich has written: 'Cyberterrorism and computer crimes' -- subject(s): Computer crimes, Computer networks, Computer security, Information warfare, International cooperation, Security measures
Lech Janczewski has written: 'Managerial guide for handling cyber-terrorism and information warfare' -- subject(s): Computer crimes, Cyberterrorism, Information technology, Information warfare, Management 'Internet and Intranet Security Management'
Salvatore J. Stolfo has written: 'Insider attack and cyber security' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Congresses, Computer security, Security measures, Prevention
Domestic terrorism, International terrorism, State-sponsored terrorism, Narco-terrorism, Biological terrorism, at Cyberterrorism -source: Kasaysayan ng Daigdig: batayang Aklat sa Araling panlipunan Ikatlong taon
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. an assault on electronic communication networks. In the related links box below, I posted the wikipedia article on computer crime.