is a new terrorist tactic that makes use of information systems or digital technology,
especially the Internet, as either an instrument or a target. As the Internet
becomes more a way of life with us,it is becoming easier for its users to become
targets of the cyberterrorists. The number of areas in which cyberterrorists could
strike is frightening, to say the least.
difference between the conventional approaches of terrorism and new methods is
primarily that it is possible to affect a large multitude of people with minimum
resources on the terrorist's side, with no danger to him at all. We also glimpse
into the reasons that caused terrorists to look towards the Web, and why the Internet
is such an attractive alternative to them.
growth of Information Technology has led to the development of this dangerous
web of terror, for cyberterrorists could wreak maximum havoc within a small time
span. Various situations that can be viewed as acts of cyberterrorism have also
been covered. Banks are the most likely places to receive threats, but it cannot
be said that any establishment is beyond attack. Tips by which we can protect
ourselves from cyberterrorism have also been covered which can reduce problems
created by the cyberterrorist.
as the Information Technology people of tomorrow need to study and understand
the weaknesses of existing systems, and figure out ways of ensuring the world's
safety from cyberterrorists. A number of issues here are ethical, in the sense
that computing technology is now available to the whole world, but if this gift
is used wrongly, the
consequences could be disastrous. It is important that
we understand and mitigate cyberterrorism for the benefit of society, try to curtail
its growth, so that we can heal the present, and live the future
You may also like this : Wireless USB, Zero Knowledge Protocols and Proof Systems, Tempest and Echelon, Synthetic Aperture Radar System, Unlicensed Mobile Access, Windows DNA, Laptop Computer, Intelligent Software Agents, IP spoofing, Internet Access via Cable TV Network, IDS, 10 Gigabit Ethernet, Tripwire, Ubiquitous Networking , Unicode And Multilingual Computing, XML Encryption , Y2K38 , Satellite Radio , Light emitting polymers , Sensors on 3D Digitization , Robotic Surgery , Ipv6 - The Next Generation Protocol , Nanorobotics , Dual Core Processor , Cisco IOS Firewall , Iris Scanning , LWIP , Smart card , Quantum Information Technology, Asynchronous Chips , Cellular Through Remote Control Switch , HVAC, Terrestrial Trunked Radio , Swarm intelligence & traffic Safety , Optical Switching , FRAM , IDC , Driving Optical Network Evolution , Cellular Neural Network , Radio Network Controller , Digital Audio Broadcasting , Significance of real-time transport Protocol in VOIP , Space Mouse , Resilient Packet Ring Technology , Wireless Networked Digital Devices, SATRACK , Smart Pixel Arrays , Project Oxygen , Wearable Bio-Sensors , Mobile Virtual Reality Service,IT Seminar Reports, PPT and PDF.