• Home
  • Blog
  • Lamar University Computer Science Cyber Terrorism Discussion

Lamar University Computer Science Cyber Terrorism Discussion

0 comments

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

Please provide 2 replays

Threat is one types of errors that is used to damage the software and creates unnecessary interference in the system. Most of the threats are created with the help of internet because internet is an open platform where multiple person are involve based on their requirement.(R)
————————————-
This includes the various forms of cybersecurity attacks that refer to cyber terrorism. This includes hacking, which may combine with other elements of terrorism. For example, hacking is dangerous to both the government and private institutions. In this regard, hacking stabled with political activists to perform a serious threat to the government.(S)
 

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}