Your SlideShare is downloading. ×
0
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Future of Cyber Terrorism
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Future of Cyber Terrorism

210

Published on

Cyber terrorism is on the rise and is constantly affecting millions every day. These malicious attacks can affect one single person to government entities. These attacks can be done with a few lines …

Cyber terrorism is on the rise and is constantly affecting millions every day. These malicious attacks can affect one single person to government entities. These attacks can be done with a few lines of code or large complex programs that have the ability to target specific hardware. The authors investigate the attacks on individuals, corporations, and government infrastructures throughout the world. Provided will be specific examples of what a cyber-terrorist attack is and why this method of attack is the preferred method of engagement today. The authors will also identify software applications which track system weaknesses and vulnerabilities. As the United States (U.S.) government has stated an act of cyber terrorism is an act of war it is imperative that we explore this new method of terrorism and how it can be mitigated to an acceptable risk.

Learning Outcomes:
• Define Cyber Terrorism
• Understand Associated Risks with Cyber Terrorism
• Gain Awareness in Emerging Cyber Threats
• Understand Applicability to Doctoral Research

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
210
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
17
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

×