Society today is one of the electronic age. This is where most rely on computers and the information they bear in almost every aspect of their lives. Whether it is banking, heath care, emergency and government services, transportation, telecommunications, oil and gas distribution, power and water supply, it is something that society has become increasingly dependent upon (Taylor, Fritsch, Liedrbach, Holt, 2011, p.22). This is what our Nation’s infrastructure is made of now. Since the infrastructure is so dependent on the internet and electronics it makes the Nation’s vulnerability to cyberterrorism extremely high.
Cyberterrorism is a component of information warfare. Information warfare can be defined as actions that are taken to achieve significant advantage, objective or success over an adversary (p.19). So anything that can be manipulated in order to command or pressure the actions of a decision maker. Cyberterrorism is a specific intent against information, computer systems, computer programs, and data that can result against individuals as targets (p.20).
Areas of attack include infrastructure attacks that are designed to destroy a system that includes crucial data. Information attacks that are concentrated on destroying or adjusting the content of electronic files or computer systems. Technological facilitation when the use of cyber communication is used to deliver and coordinate plans for a terrorist attack, provoke an attack, or otherwise aid in the facilitation of terrorism. Promotion includes getting individuals by recruiting or soliciting others to their cause (p.21).
An infrastructure attack was made by a teenage back in 1997. He had hacked into the telephone system in Massachusetts causing it to be down for more than six hours. This phone service controlled was the main control tower for the airport fire department, airport security, and other departments. His actions caused flights to be canceled all over the country and a significant financial loss to the airliners and airport (p.23). This was just some teenager wanting something fun to do just think what a trained terrorist could do.
An information attack happen in1998 where individuals from all over decided to...