Слайд 3Plan:
. Cyberterrorism
. History
. International attacks and
response
. Motivations for cyberattacks
. Conclusion
. Referenses

Слайд 5Cyberterrorism is the use of the Internet to conduct violent acts that result in,

or threaten, loss of life or significant bodily harm, in order to achieve political gains through intimidation
Слайд 8There are many different motives for cyberattacks, with the majority being for

financial reasons. However, there is increasing evidence that hackers are becoming more politically motivated. Cyberterrorists are aware that governments are reliant on the internet and have exploited this as a result. For example, Mohammad Bin Ahmad As-Sālim's piece '39 Ways to Serve and Participate in Jihad' discusses how an electronic jihad could disrupt the West through targeted hacks of American websites, and other resources seen as anti-Jihad, modernist, or secular in orientation
Слайд 9Public interest in cyberterrorism began in the late 1990s, when the term

was coined by Barry C. Collin. The high-profile terrorist attacks in the United States on September 11, 2001 and the ensuing War on Terror by the US led to further media coverage of the potential threats of cyberterrorism in the years following.
Слайд 11As of 2016 the United Nations only has one agency that specializes

in cyberterrorism, the International Telecommunications Union.
Слайд 12The internet is very useful for terrorists. Hsinchun Chen says he can

get inside the websites of terrorists and follow conversations. He describes recruitment methods, and the psychology employed. He says the internet has given terrorists a global reach and influence.
Слайд 14According to the U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated,

politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.
Слайд 15Cyber terrorism, also known as electronic terrorism or information wars, can be defined as any act

of Internet terrorism which includes deliberate and large-scale attacks and disruptions of computer networks using computer viruses, or physical attacks using malware, to attack individuals, governments and organizations.