2. technology has become essential in our daily life,
for some functions that we can make life easier,
the internet has provided a virtual battle PAISS
conflict with others, "This transformation in the
methods of terrorism from traditional methods to
electronic methods is becoming one of the biggest
chalenges to modern societies. "
3. TERRORISM:
"The premeditated, politically motivated attack
against information, computer systems, software,
and data which result in violence against
noncombatant targets by sub national groups or
clandestine agents“
criminal use of computer use, leading to violence,
and disruption of services to create fear, for the
purpose of influencing a government order to
adapt the social day.
4.
5. Americans from the most dangerous terrorists are
Al-Qaeda, Afghanistan indicate that the group has
explored systems that control U.S. energy facilities,
water supply, communication systems and other
critical infrastructure.
A study covering the second half of 2002 showed
that the most dangerous country for originating
malicious cyber attacks is the United States with
35.4% of cases compared with 40% in the first half
of the year. South Korea came along with 12.8%,
followed by China 6.2% Germany 6.7% then
France then 4%. The UK was the number 9 with
2.2%.
6.
7. hit the 13 root servers that provide the primary
roadmap for all Internet communications. in 1997,
a hacker's computer system disables the airport
control tower. In 1998 the attacks were launched
against NASA, the Navy and the Department of
Defense computer systems
8. The Interpol, with its 178 member countries, is doing
a great job in fighting against cyber terrorism. They
are helping all the member countries and training
their personnel.
The Association of South East Asia Nations (ASEAN)
has set plans for sharing information on computer
security. They are going to create a regional cyber-
crime unit by the year 2005.
9. If someone exploded a bomb that causes physical
harm to innocent people or hacked into a web-
based IT system in a way that could, for example,
outline a network of energy and
consequently blackout, apparently the result is the
same.
"By using the Internet, terrorism can
affect much more damage orchange to a
country that could be killing some people
in countriesDisabling a military defense to
interrupt power. In a large area, terrorismcan
affect more people at less risk, than through other
means "