Wednesday 15 June 2011




In my previous post, I wrote an introduction about cyber terrorism in this and next parts I will continue the discussion.
Generally cyber terrorism is created to describe the computer-based attacks against the target’s assets. These attacks happen in cyberspace and all will show some common elements to all acts of terrorism. One is that cyber terrorist will attack on purpose and the attack should be planned since they involve the acquisition of software to do the attack. The second one is that the attacks are designed to impact political structure and cyber terrorists are hackers with political motivation.
The other one is that cyber terrorists often attack civilian interests that result in violence against person or property and generate fear. The last one is that cyber terrorism is sometimes separated from cyber warfare or information warfare which these are computer-based attacks designed by nation and states.
Cyber warfare is another form of cyber attacks that is used to describe aspects of defending and attacking information in cyberspace as well as denying the target’s ability to do the same. In cyber warfare or information warfare the information technology is used as an instrument to attack the target or better adversary’s computer system. Personal information warfare is a kind of attack such as corrupting the personal information such as medical or credit files information. And the other one can be global in information warfare which aims at a country’s critical computer system to disrupt the country by disabling its systems, such as communication, transportation and so on.




No comments:

Post a Comment