This document discusses cyber terrorism and its threats. It defines cyber terrorism as using the internet to conduct terrorist activities, such as disrupting computer networks through viruses or denial of service attacks. Some examples given include hacking, website defacing, and making terroristic threats via email. The document warns that future terrorists may cause more damage with computers than bombs. It advises being cautious online and keeping software and passwords updated to help prevent cyber terrorism threats.