Chapter 12. Cyber Terrorism and Information Warfare

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

• Explain what cyber terrorism is and how it has been used in some actual cases

• Understand the basics of information warfare

• Have a working knowledge of some plausible cyber terrorism scenarios

• Have an appreciation for the dangers posed by cyber terrorism

Introduction

Throughout this book, various ways have been examined in which a person might use a computer to commit a crime. This book has also looked into specific methods to make a system more secure. One issue that has not been addressed is that of cyber terrorism. People in countries around the world have grown accustomed ...

Get Computer Security Fundamentals, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.