SlideShare a Scribd company logo
1 of 8
*THE GAP BETWEEN EDUCATED AND
UNEDUCATED,
ECONOMIC CLASSES AND GLOBAL CLASS
*SKILLED AND NON SKILLED PEOPLE











1. RESOLVING THE DIGITAL DEVIDE DEMANDS A NATIONAL
INITIATIVE
2. COMMUNITY RELEVANCE AND COMMUNITY
INVOLVEMENT
3.RETHINK EDUCATIONAL APPROACHES
4. CONTINUE AND EXPAND GOVERNMENT PROGRAMS AND
PROVIDE ADDITIONAL FUNDING TO RESOLVE THE DIGITAL
DIVIDE
5. RETHINK MARKET APPROACHES
6.MORE RESEARCH, DATA COLLECTION AND EVALUATION
7. BETTER TECHNOLOGY AND MORE MINORITY OWNED
BUSINESSES.
BY “THE NET WORKING AND INFORMATION TECHNOLOGY
RESEARCH AND DEVELOPMENT”
<http://www.nitrd.gov/PUBS/pitac/digital_divide/pres2feb00ddlresc.aspx>
CYBER RELATED CRIME
OR INTERNET RELATED CRIMES DEPEND ON THE SCOPE OF
THE CRIME. SO CYBER RELATED SCOPE WISE CRIME IS CYBER
RELATED CRIMES. IT COULD BE LOCAL, STATE WISE, FEDERAL
AND INTERNATIONAL. FOR EXAMPLE:
*COMPUTER INTRUSION I.E. HACKING
*PASSWORD TRAFFICKING
*COUNTERFEITING OF CURRENCY
*CHILD EXPLOITATION AND INTERNET FRAUD
*SPAM AND HARASSMENT
*BOMB THREAT IN INTERNET
www.justice.gov/criminal/cybercrime/reporting.html by THE
UNITED STATES DEPARTMENT OF JUSTICE





Hacker means a clever programmer who break into
computer information or systems or software that means
stealing information from computer. They are spying on
people, government. They are too selfish that they may
crash a system and claim that they do nothing intentionally.
They can freeload all secured information which they
should not.
 Cracker
The bad boy who tries to break the line of systems security
for special codes destroy vital data.
Hacker are interested in the hidden and obscure parts of a
computer or operating system. Hackers actually find the
weak point in the security systems and keeps the owner in
continuous check up. They are looking for knowledge(more
in my video)


http://lerablog.org/technology/the-difference-between-cracker-and-hacker by LERA BLOG









1. Do not do any harm. Do not damage computer or data.
Most of the time they stay funny, many people experience
them.
2. They do not alter or destroy any data as the crackers.
They want to explore the system and learn more. So they
have a thirst for knowledge. Hacker thinks hacking is
harmless but to fix it victims need to spend their valuable
times and efforts. Hackers do not want to waste anything.
3. keep a low profile
4. if suspected and accused then deny it.
5. they like free flow of information
6. sharing








ACCORDING TO U.S. FEDERAL BUREAU OF
INVESTIGATION, CYBER TERRORISM IS ANY POLITICALLY
MOTIVATED ATTACK AGAINST INFORMATION, COMPUTER
SYSTEMS, COMPUTER PROGRAMS, DATA WHICH RESULTS
IN VIOLENCE AGAINST NON- COMBATANT TARGETS.
THE OBJECT OF CYBER TERRORISM IS HARMING OTHER
PEOPLE FINANCIALLY, PHYSICALLY.
TARGET OF CYBER TERRORISM IS THE BANKING
INDUSTRY, MILITARY INSTALLATIONS, POWER
PLANTS, AIR TRAFFIC CONTROL CENTERS OR ANY
SOCIETAL SYSTEMS.
HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/CYBERTERRORISM BY
ROUSE MARGARET IN “CYBERTERRORISM”







IT IS THE STRUGGLE OVER THE INFORMATION AND
COMMUNICATION PROCESS. INFORMATION WARFARE IS
THE APPLICATION OF DESTRUCTIVE FORCE ON A LARGE
SCALE AGAINST INFORMATION ASSETS AND SYSTEMS
AGAINST THE COMPUTERS AND NETWORKS THAT
SUPPORT THE FOUR CRITICAL INFRASTRUCTURES:
THE POWER GRID
COMMUNICATIONS
FINANCIAL
TRANSPORTATION.

http://www.fas.org/irp/eprint/snyder/infowarfare.html. INFORMATION WARFARE BY BRIAN
C. LEWIS









INFORMATION WARFARE PROHIBITS ENEMIES TO ASSURE
THE INTEGRITY, AVALIBILITY AND INTEROPERABILITY OF
FRIENDLY INFORMATION ASSETS BY NDU. SO WE HAVE TO
CONTROL INFORMATION FOR POSSIBLE TERRORISM.
INFORMATION MUST BE DEFENDED AGAINST THEFT,
MODIFICATION AND DESTRUCTION. INFORMATION MUST
BE VERIFIED AFTER RECEIVING. INFORMATION MUST BE
PROTECTED AND TRUSTED AT ALL LEVELS. DISTRIBUTION
OF INFORMATION MUST BE SECURED. WE HAVE TO TRY
TO KNOW THE ENEMIES INFORMATION AND TRY TO
AFFECT THE ROOT OF THE THINKING OF THE ENEMIES
AND AFFECT THAT.
CYBERWAR MAINLY CORRELATED WITH MILITARY
REALM.
(DESCRIPTIONS IN MY VIDEOS IN THE EMAIL)

More Related Content

What's hot

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 

What's hot (20)

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 

Viewers also liked

Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013
Wilis Budiarsy
 
My story powerpoint
My story powerpoint My story powerpoint
My story powerpoint
Paul Ruales
 

Viewers also liked (13)

פרוספקט של חברת פרפקטו פלור
פרוספקט של חברת פרפקטו פלורפרוספקט של חברת פרפקטו פלור
פרוספקט של חברת פרפקטו פלור
 
Presentation
PresentationPresentation
Presentation
 
Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013Kota Solo - SIPA (Solo International Performing Art) 2013
Kota Solo - SIPA (Solo International Performing Art) 2013
 
Loveislife
LoveislifeLoveislife
Loveislife
 
Rigging systems
Rigging systemsRigging systems
Rigging systems
 
İzmir
İzmirİzmir
İzmir
 
Hand tools
Hand toolsHand tools
Hand tools
 
The numbers and colors
The numbers and colorsThe numbers and colors
The numbers and colors
 
My story powerpoint
My story powerpoint My story powerpoint
My story powerpoint
 
Coiling Cables
Coiling CablesCoiling Cables
Coiling Cables
 
Vocabulary skills In Linguistics!!
Vocabulary skills In Linguistics!! Vocabulary skills In Linguistics!!
Vocabulary skills In Linguistics!!
 
The Reading Skill in Linguistics!!!!!
The Reading Skill in Linguistics!!!!!The Reading Skill in Linguistics!!!!!
The Reading Skill in Linguistics!!!!!
 
"Domestic Violence"
"Domestic Violence""Domestic Violence"
"Domestic Violence"
 

Similar to Digital divide final ppt

Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
Kyle Heller
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
debishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ronnasleightholm
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
msdee3362
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
ronak56
 

Similar to Digital divide final ppt (20)

COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
The Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptxThe Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptx
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Social Media in the Philippines.pptx
Social Media in the Philippines.pptxSocial Media in the Philippines.pptx
Social Media in the Philippines.pptx
 
Social engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptxSocial engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptx
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
Business law assignment
Business law assignmentBusiness law assignment
Business law assignment
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Digital divide final ppt

  • 1. *THE GAP BETWEEN EDUCATED AND UNEDUCATED, ECONOMIC CLASSES AND GLOBAL CLASS *SKILLED AND NON SKILLED PEOPLE
  • 2.          1. RESOLVING THE DIGITAL DEVIDE DEMANDS A NATIONAL INITIATIVE 2. COMMUNITY RELEVANCE AND COMMUNITY INVOLVEMENT 3.RETHINK EDUCATIONAL APPROACHES 4. CONTINUE AND EXPAND GOVERNMENT PROGRAMS AND PROVIDE ADDITIONAL FUNDING TO RESOLVE THE DIGITAL DIVIDE 5. RETHINK MARKET APPROACHES 6.MORE RESEARCH, DATA COLLECTION AND EVALUATION 7. BETTER TECHNOLOGY AND MORE MINORITY OWNED BUSINESSES. BY “THE NET WORKING AND INFORMATION TECHNOLOGY RESEARCH AND DEVELOPMENT” <http://www.nitrd.gov/PUBS/pitac/digital_divide/pres2feb00ddlresc.aspx>
  • 3. CYBER RELATED CRIME OR INTERNET RELATED CRIMES DEPEND ON THE SCOPE OF THE CRIME. SO CYBER RELATED SCOPE WISE CRIME IS CYBER RELATED CRIMES. IT COULD BE LOCAL, STATE WISE, FEDERAL AND INTERNATIONAL. FOR EXAMPLE: *COMPUTER INTRUSION I.E. HACKING *PASSWORD TRAFFICKING *COUNTERFEITING OF CURRENCY *CHILD EXPLOITATION AND INTERNET FRAUD *SPAM AND HARASSMENT *BOMB THREAT IN INTERNET www.justice.gov/criminal/cybercrime/reporting.html by THE UNITED STATES DEPARTMENT OF JUSTICE
  • 4.    Hacker means a clever programmer who break into computer information or systems or software that means stealing information from computer. They are spying on people, government. They are too selfish that they may crash a system and claim that they do nothing intentionally. They can freeload all secured information which they should not.  Cracker The bad boy who tries to break the line of systems security for special codes destroy vital data. Hacker are interested in the hidden and obscure parts of a computer or operating system. Hackers actually find the weak point in the security systems and keeps the owner in continuous check up. They are looking for knowledge(more in my video)  http://lerablog.org/technology/the-difference-between-cracker-and-hacker by LERA BLOG
  • 5.       1. Do not do any harm. Do not damage computer or data. Most of the time they stay funny, many people experience them. 2. They do not alter or destroy any data as the crackers. They want to explore the system and learn more. So they have a thirst for knowledge. Hacker thinks hacking is harmless but to fix it victims need to spend their valuable times and efforts. Hackers do not want to waste anything. 3. keep a low profile 4. if suspected and accused then deny it. 5. they like free flow of information 6. sharing
  • 6.     ACCORDING TO U.S. FEDERAL BUREAU OF INVESTIGATION, CYBER TERRORISM IS ANY POLITICALLY MOTIVATED ATTACK AGAINST INFORMATION, COMPUTER SYSTEMS, COMPUTER PROGRAMS, DATA WHICH RESULTS IN VIOLENCE AGAINST NON- COMBATANT TARGETS. THE OBJECT OF CYBER TERRORISM IS HARMING OTHER PEOPLE FINANCIALLY, PHYSICALLY. TARGET OF CYBER TERRORISM IS THE BANKING INDUSTRY, MILITARY INSTALLATIONS, POWER PLANTS, AIR TRAFFIC CONTROL CENTERS OR ANY SOCIETAL SYSTEMS. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/CYBERTERRORISM BY ROUSE MARGARET IN “CYBERTERRORISM”
  • 7.      IT IS THE STRUGGLE OVER THE INFORMATION AND COMMUNICATION PROCESS. INFORMATION WARFARE IS THE APPLICATION OF DESTRUCTIVE FORCE ON A LARGE SCALE AGAINST INFORMATION ASSETS AND SYSTEMS AGAINST THE COMPUTERS AND NETWORKS THAT SUPPORT THE FOUR CRITICAL INFRASTRUCTURES: THE POWER GRID COMMUNICATIONS FINANCIAL TRANSPORTATION. http://www.fas.org/irp/eprint/snyder/infowarfare.html. INFORMATION WARFARE BY BRIAN C. LEWIS
  • 8.      INFORMATION WARFARE PROHIBITS ENEMIES TO ASSURE THE INTEGRITY, AVALIBILITY AND INTEROPERABILITY OF FRIENDLY INFORMATION ASSETS BY NDU. SO WE HAVE TO CONTROL INFORMATION FOR POSSIBLE TERRORISM. INFORMATION MUST BE DEFENDED AGAINST THEFT, MODIFICATION AND DESTRUCTION. INFORMATION MUST BE VERIFIED AFTER RECEIVING. INFORMATION MUST BE PROTECTED AND TRUSTED AT ALL LEVELS. DISTRIBUTION OF INFORMATION MUST BE SECURED. WE HAVE TO TRY TO KNOW THE ENEMIES INFORMATION AND TRY TO AFFECT THE ROOT OF THE THINKING OF THE ENEMIES AND AFFECT THAT. CYBERWAR MAINLY CORRELATED WITH MILITARY REALM. (DESCRIPTIONS IN MY VIDEOS IN THE EMAIL)