If China hacks Apple and finds how to make an iphone, they can make their own phones and sell them at a lower price. Countries are attacking each other so they can access information that would otherwise be off limits
A common method of cyberterrorism is to attack a large bank. The hacker will usually send an executive a message saying they want a certain amount of money in a certain period of time. The banks usually comply because the don’t want the public to know how vulnerable they are. Hackers also perform attacks just to show off.
Disinformation – a rumor was started by a hacker that there were kidneys on sale on the internet. Death – a mob boss was shot but still alive. Hackers changed his medication so he would get a lethal injection. The hackers changed back the medication after he died. The hackers ruined the reputation of the nurse who injected the patient http://csciwww.etsu.edu/gotterbarn/stdntppr/cases.htm
Since the attacker is using the internet, it is more difficult to detect how the attacker is.
Iowa State University launched a US Department of Justice funded test lab designed to simulate, investigate and recreate cyber attacks over the Internehttp://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/november-2011/cyber-terror
http://3.bp.blogspot.com/-tSjSB8JjCNs/Tbgbg9PhM5I/AAAAAAAABkw/GnOYV35Zn7g/s1600/cyber_terrorism3%2Bcopy.jpgSoftware designers can develop stronger, more effective security defenses to make hacking more difficult. Hackers are more knowledgeable than ever and can get past many defenses