• Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
151
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
10
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyber TerrorismFor my term paper, I researched on Cyber Terrorism. I believe that Cyber Terrorism is a big problem in oursociety and may even be a worldwide problem for all humanity today. I want to do my term paper on CyberTerrorism because I had some personal experience with this sort of terrorism. About a two years ago, Iencountered a Hacker on America Online. I opened an unknown message in my mailbox that was titled“Free Nude Teens”. Then about a couple weeks later, we received all sorts of bills that had to be paid. Myfather received bills for many different things such as electronics, clothes, and other items that had beenpurchased under our account on the Internet. My father was so pissed off because he thought that mybrothers or I had purchased all those items. So we called the Company and found that our computer hadbeen hacked into. And the so called hacker purchased items on our account number. And we found that thehacker gained entry by a message that I had opened . So we ended up paying only a thousand dollars out ofalmost six-thousand dollars worth of goods purchased on America Online. I want to do my research paperon Cyber Terrorism because I want to stress to people that this is a big problem and will become...I think that every computer professional, including the best, have mad a mistake that has caused the loss ofdata, service or money. They do not know the implications of what they are doing. 1) All accounts shouldhave passwords and the passwords should be unusual and difficult to guess. But the deputy nationalsecurity adviser, said agencies simply need better cooperation in the fight against terrorism, no another newagency. They even have chat rooms for hackers to share their hacking knowledge with each other. Not allhackers are dangerous and out to destroy business or damage lives. ” It was devised and developed by BellLabs. Though, eventually hackers would want to be able to break those codes. A hacker in Road Runnercan easily glide into an unprotected PC.Hacking has become such a problem in today’s computer dependent society that stronger measures mustbe implemented to stop hackers, and if hackers are still successful, they should be severely punished. Butsome people know cyber terrorism as “information warfare” which means the ability to unleash horror anddevastation with a few well-aimed strokes on a computer keyboard. Cyber Terrorism is such a destructiveforce that our country lost millions of dollars to hacking terrorists from other countries. This leaves teenagersto learn about hacking on bulletin boards, chat lines, and many other places. And they make it soundexciting by telling you the kind of pleasure you could gain from it like money, power, and just simple funwhich would attract bored teens at home.Common topics in this essay: