After reading this chapter and completing the exercises, you will be able to do the following:
Explain what cyber terrorism is and how it has been used in some actual cases
Understand the basics of information warfare
Have a working knowledge of some plausible cyber terrorism scenarios
Have an appreciation for the dangers posed by cyber terrorism
Throughout this ...