Cyber Terror SS09

Cyber Terror SS09 - Cyber Terror Professor Holt Computer...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Cyber Terror Professor Holt Computer Crime
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Cyber-terror? We have talked about all manner of criminal and deviant behavior this semester What about terrorism? Why should we discuss these issues? Is it a criminal justice problem? A information systems problem?
Background image of page 2
3 Information Warfare Information warfare is a term used to describe the use and manipulation of information to gain advantage over others Psychological operations Electronic warfare Military deception Physical destruction Security measures Information attacks
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Cyberterrorism Terrorism involves the actual or threatened use of violence by an individual or group motivated by ideological or political objectives Cyberterrorists utilize similar tactics against information systems or computer resources to the same end Cyberterror is a relatively nebulous term
Background image of page 4
5 Why Worry? Allows for asymetric attacks Groups with relatively little power or size can perform devastating attacks with little expense Incorporates citizens into events Also provides force multipliers A physical attack coupled with a computer based attack What about 9/11
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Threats? A number of groups are primary concerns to US resources Radical muslim groups Chinese and North Korean government State supported hacking? Environmental groups Radical political groups within the US The threat varies with each country around the globe
Background image of page 6
7 Targets? There are a multitude of targets and weak points in the US
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/08/2009 for the course CJUS 4000 taught by Professor Dr.holt during the Spring '09 term at UNC Charlotte.

Page1 / 19

Cyber Terror SS09 - Cyber Terror Professor Holt Computer...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online