Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
 Computers   and the internet are being used by individuals and societies to make their life easier.
 The people use them for storing information procesing data. Sending and receiving messages to communications, controling...
 The  internet has  provided a virtual war  for countries having  problems with other  such.   As taiwan againts  China,I...
 The tremendous, nole computer stimulated crimals and terrorists to make it their prefered tool for attacking targets
   From american point of view the most    dangerous terrorist group is Al-Qaeda which is    considered the first enemy f...
 Cyberterrorist prefer using the cyber attack methods because of many advantages for it
 It   is cheaper than traditional  methods
 Theaction is very difficult to be tracked
 Theycan hide their personalities and location
 Thereare no physical barries or check to cross
 They     can do it remotely from anywhere in the world
 Theycan use this method to attack a big number of targets
 They     can affect a large number of people
Cyber terrorism
Cyber terrorism
Upcoming SlideShare
Loading in …5
×

Cyber terrorism

874 views

Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Cyber terrorism

  1. 1.  Computers and the internet are being used by individuals and societies to make their life easier.
  2. 2.  The people use them for storing information procesing data. Sending and receiving messages to communications, controling machines.
  3. 3.  The internet has provided a virtual war for countries having problems with other such. As taiwan againts China,Israel against PalestineandIndia againts pakistanChina
  4. 4.  The tremendous, nole computer stimulated crimals and terrorists to make it their prefered tool for attacking targets
  5. 5.  From american point of view the most dangerous terrorist group is Al-Qaeda which is considered the first enemy for the US. Acording to US officials data from computers seized in afganistan indicate that the group has scouted sistems that control American energy facilities, water distribution, communication systems, and other critical infrastructure.
  6. 6.  Cyberterrorist prefer using the cyber attack methods because of many advantages for it
  7. 7.  It is cheaper than traditional methods
  8. 8.  Theaction is very difficult to be tracked
  9. 9.  Theycan hide their personalities and location
  10. 10.  Thereare no physical barries or check to cross
  11. 11.  They can do it remotely from anywhere in the world
  12. 12.  Theycan use this method to attack a big number of targets
  13. 13.  They can affect a large number of people

×