Good Games!

What? Play games on the computer in class? No way!!
Yes way.
http://www.freerice.com/
http://www.scrabulous.com/


Free Film & Television Scripts!!

Friday, November 7, 2008

CYBERTERRORISM

How Real Is the Threat?








what is cyberterrorism , are they arabs on dell laptops in the sahara causing terrosim in online chat sites?



Cyber terrorism can be generalised as Terrorising networks from Security systems to banking networks from money Cyb er-Stalking
Hacking, Cracking, Phreaking , counterfeit. the Internet is such a new and exciting innovation, its used for banking, accounting, purchasing and selling items, ordering and stocking, communication , chat rooms , profile sits (myspace,facebook). the Internet is used for storing and sharing information.



The Internet, like every system needs to have a security setup to hold and secure private and secret information from getting into the wrong hands.

Personal information and account numbers and banking details are all stored on banking sites so there is a high security network system setup, just like a banking security service to prevent hackers and scammers of obtaining this information




"Nuclear weapons and other sensitive military systems, as well as the computer systems of the CIA and FBI, are "air-gapped," making them inaccessible to outside hackers. Systems in the private sector tend to be less well protected, but they are far from defenseless, and nightmarish tales of their vulnerability tend to be largely apocryphal. "

"But although the fear of cyberterrorism may be manipulated and exaggerated, we can neither deny nor ignore it. Paradoxically, success in the "war on terror" is likely to make terrorists turn increasingly to unconventional weapons, such as cyberterrorism. And as a new, more computer-savvy generation of terrorists comes of age, the danger seems set to increase."

qouted from http://www.usip.org/pubs/specialreports/sr119.html


Cyber terrorism is real and may hit us hard.The Government needs to Build and look into its security systems to advance as the hackers advance.

No comments: