Give students something to think about when they're next using their computers-the dangers of cyberterrorism. At no time in history has information been so accessible to the individual, or so vulnerable to attack by a single crafty terrorist armed with only a computer and an Internet connection. In spite of developments in encryption (protective coding), firewalls (barriers to unauthorized access), and other security systems, there is always the threat that criminals will hack through a computer network's security system, from any location in the world, no matter how remote. Is there any way to stop or prevent cyberterrorism, or are we doomed to be thrust back into the relative dark ages of the pre-digital era in the blink of an eye-or the click of a mouse?
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Al Qaeda ARPANET Barack Obama blackout bombing botnet breaches cause Citizenship and Cyber civilian Code Red worm Computer Crime computer security computer systems computer to computer computer virus computer worm Conficker control systems conventional terrorists critical infrastructure Cyber Citizenship Cyber Safety cyberattacks Cybercrime cybersecurity cyberterrorist cyberwarfare Cybots damage defense delete files denial-of-service attacks disrupt e-mail electrical example fear of cyberterrorism firewalls forms of malware Gary McKinnon hackers hacking Hacktivism incident infected Kevin Mitnick Kevin Poulsen malicious program malicious software malware ment military million monitoring nation’s computer National Laboratory NewYork Oak Ridge Obama Obscene or offensive offensive content one’s power grid power outage puter systems Qaeda reported Retrieved April 2009 Rosen Central SCADA scenario security administrator security experts spread system or network target telecommunications Terrorism terrorist attacks terrorist groups threat Titan Rain U.S. Computer U.S. Department viruses vulnerable to attack