Cyber Terrorism Evolution

Cyber Terrorism Evolution

Andrew Colarik (Consultant, New Zealand)
Copyright: © 2006 |Pages: 25
DOI: 10.4018/978-1-59904-021-9.ch003
OnDemand PDF Download:
$37.50

Abstract

Begin to discern the connection between terrorism and technology. Ö Understand the evolution from hackers to crackers, crackers to cyber criminals, and cyber criminals to cyber terrorists. Ö Identify the key elements that comprise the term cyber terrorism. Ö Become familiar with the support role that a cyber terrorist can bring to a terrorist organization. Ö Understand the potential collaborations between criminal organizations and terrorist groups in attaining cyber skills.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Henry B. Wolfe
Acknowledgment
Chapter 1
Introduction  (pages 1-13)
Andrew Colarik
Learn more about recent terrorist atrocities. Ö Identify the main sponsors of global terrorism today. Ö Comprehend the link between diminished... Sample PDF
Introduction
$37.50
Chapter 2
The Power of Terrorism  (pages 14-32)
Andrew Colarik
Create a foundational understanding of traditional terrorism in order to apply its goals, methods, and means to cyber terrorism. Ö Identify the key... Sample PDF
The Power of Terrorism
$37.50
Chapter 3
Andrew Colarik
Begin to discern the connection between terrorism and technology. Ö Understand the evolution from hackers to crackers, crackers to cyber criminals... Sample PDF
Cyber Terrorism Evolution
$37.50
Chapter 4
Andrew Colarik
Identify the major components of the global information infrastructure. Ö Begin to understand how communication network technologies are bringing... Sample PDF
Global Information Infrastructure
$37.50
Chapter 5
Andrew Colarik
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal... Sample PDF
Current Cyber Attack Methods
$37.50
Chapter 6
Attack Scenarios  (pages 111-146)
Andrew Colarik
Recognize that through global access to information, we are all potential targets. Ö Begin to understand just how much information that can be used... Sample PDF
Attack Scenarios
$37.50
Chapter 7
Thoughts for the Future  (pages 147-165)
Andrew Colarik
Briefly put the previous information presented into a context for taking action. Ö Understand the relationship between user privacy and data usage.... Sample PDF
Thoughts for the Future
$37.50
About the Author