This document discusses cyberterrorism and traditional terrorism. It notes that while traditional terrorists had to find followers through printed literature, cyberterrorists can cause damage to computer infrastructure without being physically present by hiding behind computer screens. Both aim to hurt or intimidate others, though their methods differ. Defining cyberterrorism clearly could help address such malicious acts. Overall, the document explores the similarities and differences between traditional and cyber forms of terrorism.