SlideShare a Scribd company logo
CYBER TERRORISM



NAMES: María parra,
 Marco aponte, juan
  David corredor
The computer use for terrorist purposes is
 one of the greatest threats and the greatest
 challenge of the XXI century in modern
 society.
The FBI definition of terrorism:
"The unlawful use of force or violence against persons or
property to intimidate or coerce a government, the civilian
population, or any segment thereof, in furtherance of political
or social objectives."
The U.S. National
  Infrastructure Protection
 Center defined the term as:
                                
"A criminal act perpetrated by the use of computers and
telecommunications capabilities, resulting in violence,
destruction and/or disruption of services to create fear by
causing confusion and uncertainty within a given population,
with the goal of influencing a government or population to
conform to particular political, social or ideological agenda".
Why do they use cyber attacks?
  Cyber terrorist prefer using the cyber attack
   methods:
 because of many advantages for it.

 It is Cheaper than traditional methods.

 The action is very Difficult to be tracked.

 .
They can hide their personalities and location.

There are no physical barriers or check points to cross.

They can do it remotely from anywhere in the world.

They can use this method to attack a big number of targets.

They can affect a large number of people
you must be careful on the Internet

More Related Content

What's hot

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
sherrysher82
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Balvant Biradar
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
anjalika sinha
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Deepak Pareek
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
Sameer Paradia
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Suyash Shanker
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
Gayatri Aryasomayajula
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
KaustubhPathak11
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
sudheerreddy59
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 

What's hot (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 

Similar to Cyber terrorism

CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 
English presentation
English presentationEnglish presentation
English presentation
GinaSoler10
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracy
Col Mukteshwar Prasad
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
Benjamin Morley
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
philipnelson29183
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
Bini R A
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Daniel Dufourt
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
Christina Ramirez
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
dorishigh
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
evonnehoggarth79783
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
ZeroFOX
 
150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx
drennanmicah
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
REVULN
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods Upgraded
Mer Joyce
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Liz345
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
amrit47
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 

Similar to Cyber terrorism (20)

CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
English presentation
English presentationEnglish presentation
English presentation
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracy
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods Upgraded
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 

More from Maria Parra

La fundación ideas
La fundación ideasLa fundación ideas
La fundación ideas
Maria Parra
 
Graficas
GraficasGraficas
Graficas
Maria Parra
 
Derecho internacional humanitario
Derecho internacional humanitarioDerecho internacional humanitario
Derecho internacional humanitario
Maria Parra
 
Futbol sala
Futbol salaFutbol sala
Futbol sala
Maria Parra
 
Futbol sala
Futbol salaFutbol sala
Futbol sala
Maria Parra
 
Hamburgo
HamburgoHamburgo
Hamburgo
Maria Parra
 
Hamburgo
HamburgoHamburgo
Hamburgo
Maria Parra
 
Derecho internacional humanitario
Derecho internacional humanitarioDerecho internacional humanitario
Derecho internacional humanitario
Maria Parra
 
Estequiometria
EstequiometriaEstequiometria
Estequiometria
Maria Parra
 
Cómo crear las
Cómo crear lasCómo crear las
Cómo crear las
Maria Parra
 
Cómo crear las
Cómo crear lasCómo crear las
Cómo crear las
Maria Parra
 

More from Maria Parra (12)

La fundación ideas
La fundación ideasLa fundación ideas
La fundación ideas
 
Graficas
GraficasGraficas
Graficas
 
Derecho internacional humanitario
Derecho internacional humanitarioDerecho internacional humanitario
Derecho internacional humanitario
 
Futbol sala
Futbol salaFutbol sala
Futbol sala
 
Futbol sala
Futbol salaFutbol sala
Futbol sala
 
Hamburgo
HamburgoHamburgo
Hamburgo
 
Hamburgo
HamburgoHamburgo
Hamburgo
 
Inglestodos
InglestodosInglestodos
Inglestodos
 
Derecho internacional humanitario
Derecho internacional humanitarioDerecho internacional humanitario
Derecho internacional humanitario
 
Estequiometria
EstequiometriaEstequiometria
Estequiometria
 
Cómo crear las
Cómo crear lasCómo crear las
Cómo crear las
 
Cómo crear las
Cómo crear lasCómo crear las
Cómo crear las
 

Recently uploaded

Akhilesh yadav biography | अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्रा
Akhilesh yadav biography |  अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्राAkhilesh yadav biography |  अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्रा
Akhilesh yadav biography | अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्रा
VoterMood
 
George Clooney_ Unraveling the ‘Is He Gay.pptx
George Clooney_ Unraveling the ‘Is He Gay.pptxGeorge Clooney_ Unraveling the ‘Is He Gay.pptx
George Clooney_ Unraveling the ‘Is He Gay.pptx
ashishkumarrana9
 
Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-
Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-
Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-
bhavenpr
 
Storm surge expected along the coastline of South Africa:
Storm surge expected along the coastline of South Africa:Storm surge expected along the coastline of South Africa:
Storm surge expected along the coastline of South Africa:
SABC News
 
THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...
THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...
THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...
indexPub
 
Exploring editorialbbc.com: Your Ultimate Guide to Quality Journalism
Exploring editorialbbc.com: Your Ultimate Guide to Quality JournalismExploring editorialbbc.com: Your Ultimate Guide to Quality Journalism
Exploring editorialbbc.com: Your Ultimate Guide to Quality Journalism
veyav58249
 
1(17). NIS English March 1-15 (2021).pdf
1(17). NIS English March 1-15 (2021).pdf1(17). NIS English March 1-15 (2021).pdf
1(17). NIS English March 1-15 (2021).pdf
Ranjan Kumar Gupta
 
Booklet - LGBTQ in Asia Human Rights Overview.pdf
Booklet - LGBTQ in Asia Human Rights Overview.pdfBooklet - LGBTQ in Asia Human Rights Overview.pdf
Booklet - LGBTQ in Asia Human Rights Overview.pdf
NurisHisyam
 
Team BTeam Building Leadership Skills Education_ A Pathway to Success.pdf
Team BTeam Building Leadership Skills Education_ A Pathway to Success.pdfTeam BTeam Building Leadership Skills Education_ A Pathway to Success.pdf
Team BTeam Building Leadership Skills Education_ A Pathway to Success.pdf
tewhimanshu23
 
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdf
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdfExclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdf
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdf
Phil Heath
 
Gen Z Revolution Redefining Politics through Activism.pdf
Gen Z Revolution Redefining Politics through Activism.pdfGen Z Revolution Redefining Politics through Activism.pdf
Gen Z Revolution Redefining Politics through Activism.pdf
Trims Creators
 
Juan Orlando Hernández se opone a la confiscación de $15 millones
Juan Orlando Hernández se opone a la confiscación de $15 millonesJuan Orlando Hernández se opone a la confiscación de $15 millones
Juan Orlando Hernández se opone a la confiscación de $15 millones
AlexisTorres963861
 
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptx
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptxExclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptx
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptx
Phil Heath
 
Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...
Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...
Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...
kalihasan429
 
1(15). NIS English February1-15 (2021).pdf
1(15). NIS English February1-15 (2021).pdf1(15). NIS English February1-15 (2021).pdf
1(15). NIS English February1-15 (2021).pdf
Ranjan Kumar Gupta
 
For-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdf
For-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdfFor-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdf
For-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdf
bhavenpr
 
Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...
Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...
Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...
bhumivarma35300
 
Pawan Kalyan Biography- Early Life, Education, Family and Political Career
Pawan Kalyan Biography- Early Life, Education, Family and Political CareerPawan Kalyan Biography- Early Life, Education, Family and Political Career
Pawan Kalyan Biography- Early Life, Education, Family and Political Career
VoterMood
 
09072024_First India Newspaper Jaipur.pdf
09072024_First India Newspaper Jaipur.pdf09072024_First India Newspaper Jaipur.pdf
09072024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Muslim can never become a majority in India
Muslim can never become a majority in IndiaMuslim can never become a majority in India
Muslim can never become a majority in India
Ajay Prakash
 

Recently uploaded (20)

Akhilesh yadav biography | अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्रा
Akhilesh yadav biography |  अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्राAkhilesh yadav biography |  अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्रा
Akhilesh yadav biography | अखिलेश यादव की जीवनी: जीवन और राजनीतिक यात्रा
 
George Clooney_ Unraveling the ‘Is He Gay.pptx
George Clooney_ Unraveling the ‘Is He Gay.pptxGeorge Clooney_ Unraveling the ‘Is He Gay.pptx
George Clooney_ Unraveling the ‘Is He Gay.pptx
 
Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-
Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-
Saleya-Bibi-FT-Order-8-2-2024.pdf;[pwsp[-
 
Storm surge expected along the coastline of South Africa:
Storm surge expected along the coastline of South Africa:Storm surge expected along the coastline of South Africa:
Storm surge expected along the coastline of South Africa:
 
THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...
THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...
THE SENTENCE STRUCTURE AND THE PLACE OF THE PARTICIPLE IN NEWS SENTENCES OF B...
 
Exploring editorialbbc.com: Your Ultimate Guide to Quality Journalism
Exploring editorialbbc.com: Your Ultimate Guide to Quality JournalismExploring editorialbbc.com: Your Ultimate Guide to Quality Journalism
Exploring editorialbbc.com: Your Ultimate Guide to Quality Journalism
 
1(17). NIS English March 1-15 (2021).pdf
1(17). NIS English March 1-15 (2021).pdf1(17). NIS English March 1-15 (2021).pdf
1(17). NIS English March 1-15 (2021).pdf
 
Booklet - LGBTQ in Asia Human Rights Overview.pdf
Booklet - LGBTQ in Asia Human Rights Overview.pdfBooklet - LGBTQ in Asia Human Rights Overview.pdf
Booklet - LGBTQ in Asia Human Rights Overview.pdf
 
Team BTeam Building Leadership Skills Education_ A Pathway to Success.pdf
Team BTeam Building Leadership Skills Education_ A Pathway to Success.pdfTeam BTeam Building Leadership Skills Education_ A Pathway to Success.pdf
Team BTeam Building Leadership Skills Education_ A Pathway to Success.pdf
 
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdf
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdfExclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdf
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pdf
 
Gen Z Revolution Redefining Politics through Activism.pdf
Gen Z Revolution Redefining Politics through Activism.pdfGen Z Revolution Redefining Politics through Activism.pdf
Gen Z Revolution Redefining Politics through Activism.pdf
 
Juan Orlando Hernández se opone a la confiscación de $15 millones
Juan Orlando Hernández se opone a la confiscación de $15 millonesJuan Orlando Hernández se opone a la confiscación de $15 millones
Juan Orlando Hernández se opone a la confiscación de $15 millones
 
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptx
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptxExclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptx
Exclusive_ Inside the Shocking Scarlett Johansson Nude Photo Leak.pptx
 
Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...
Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...
Mysore Girls Call Mysore 0X0000000X Provide Best And Top Girl Service And No1...
 
1(15). NIS English February1-15 (2021).pdf
1(15). NIS English February1-15 (2021).pdf1(15). NIS English February1-15 (2021).pdf
1(15). NIS English February1-15 (2021).pdf
 
For-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdf
For-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdfFor-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdf
For-Website-240710-CJP-complaint-to-NCM-on-lynchings-June-July2024.pdf
 
Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...
Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...
Girls call Service Pune 000XX00000 Provide Best And Top Girl Service And No1 ...
 
Pawan Kalyan Biography- Early Life, Education, Family and Political Career
Pawan Kalyan Biography- Early Life, Education, Family and Political CareerPawan Kalyan Biography- Early Life, Education, Family and Political Career
Pawan Kalyan Biography- Early Life, Education, Family and Political Career
 
09072024_First India Newspaper Jaipur.pdf
09072024_First India Newspaper Jaipur.pdf09072024_First India Newspaper Jaipur.pdf
09072024_First India Newspaper Jaipur.pdf
 
Muslim can never become a majority in India
Muslim can never become a majority in IndiaMuslim can never become a majority in India
Muslim can never become a majority in India
 

Cyber terrorism

  • 1. CYBER TERRORISM NAMES: María parra, Marco aponte, juan David corredor
  • 2. The computer use for terrorist purposes is one of the greatest threats and the greatest challenge of the XXI century in modern society.
  • 3. The FBI definition of terrorism: "The unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives."
  • 4. The U.S. National Infrastructure Protection Center defined the term as:  "A criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to particular political, social or ideological agenda".
  • 5. Why do they use cyber attacks?  Cyber terrorist prefer using the cyber attack methods: because of many advantages for it. It is Cheaper than traditional methods. The action is very Difficult to be tracked. .
  • 6. They can hide their personalities and location. There are no physical barriers or check points to cross. They can do it remotely from anywhere in the world. They can use this method to attack a big number of targets. They can affect a large number of people
  • 7. you must be careful on the Internet