Reference no: EM133516687
Cybercrimes and Cyberterrorism
The term(s) cybercrime and cyberterrorism have many similarities and differences. These terms are often misquoted and used in the wrong perspective by private, local, state, federal, and international agencies. Utilizing the ECPI Online Library or the Internet, locate a news article, scholarly entry, court case, or other media release that discusses the similarities and differences between cybercrimes and cyberterrorism.
1. What portentous threats exist? Please be sure to identify specific crime threats, terminology, and malicious tactics of cyberterrorism such as Trojans, worms, information warfare, bits, malware, viruses, etc.
2. What future vulnerabilities exist in relation to the article or piece of research chosen to support your viewpoints and statements for this discussion?
3. What technological tools will cyber terrorists use to complete their crimes?
4. Why is it important for agencies to remain vigilant and up to date on counter cybercrime and counter cyberterrorism tactics?