Search icone
Search and publish your papers

Cyber Terrorism: The darker side of internet applications

About the author

Level
Expert

About the document

Published date
Language
documents in English
Format
pdf
Type
term papers
Pages
4 pages
Level
Expert
Accessed
2 times
Validated by
Committee Oboolo.com
  1. Abstract
  2. Introduction
  3. An overview of cyber terrirosm & targets
  4. Cyber terrirosm: Network security perspective
  5. How cyberspace is used?
  6. Counter cyberterrorism
  7. Conclusion

Cyber terrorism is the convergence of cyberspace and terrorism. Computers and the Internet are aggressively being used by many international terrorist groups. Although cyber terrorism attacks have not yet happened and also there is no such identified substantiation that terrorists are planning a coordinated ?soft? attack against critical infrastructure of public or private institutions, the loopholes in Internet security may attract their attention, as logic bomb would do a great amount of damage than a physical bomb in form of virtual violence with lot of ease in operation on terrorist part. If you consider this as hype, unfortunately you may have to utter ?failure of imagination? one more time. The purpose of this paper is to explore a new explanatory angle concerning cyber terrorism, challenges involved, network security perspective and counter-measures to minimize its' danger. Keywords: Cyber terrorism, network security

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages