Reference no: EM132850190
1. The Definition of Cyberterrorism
Discuss the current debate surrounding the definition of cyberterrorism. Why is there no common definition? What are some of the challenges associated with establishing a common definition? Provide examples of two competing definitions of cyberterrorism from different sources and discuss the differences between the definitions. What are the implications of these differences? Be sure to properly cite and reference sources used
2. Cyberterrorism vs. Cybercrime
Discuss the characteristics that would distinguish an attack of cyberterrorism from an attack of cybercrime. Discuss four specific characteristics that could be used to identify an attack as cyberterrorism or cybercrime. Why is it important to effectively distinguish between the two?
3. Cyberterrorism
The potential threat posed by cyberterrorism has provoked considerable alarm. Numerous security experts, politicians, and others have publicized the danger of cyberterrorists hacking into government and private computer systems and crippling the military, financial, and service sectors of advanced economies. Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern times are combined in the term cyberterrorism. The fear of random, violent victimization blends well with the distrust and outright fear of computer technology.
Debate continues to exist regarding the nature and definition of cyberterrorism. Using the assigned readings and additional resources, discuss the extent to which cyberterrorism exists and the characteristics that distinguish cyberterrorism from cybercrime. Provide specific examples to support your application and analysis of the debate surrounding the nature and definition of cyberterrorism. In addition, discuss the potential effects of cyberterrorism, providing specific examples.
Use at least two credible sources beyond the assigned reading and discuss how you evaluated the credibility of each source.