Mitigation And Risk Reduction

Read Complete Research Material

MITIGATION AND RISK REDUCTION

Mitigation and Risk Reduction

Mitigation and Risk Reduction

Cyber Terrorism can come in all sorts of ways through Cyber Space and it is defined in many different ways. Cyber Terrorism can come in the form of misinformation. Hacking is a good example of Cyber Terrorism. An example of hacking would be hacking into a hospital computer system and changing someone s medicine prescription to a lethal dosage as an act of revenge. Cyber Terrorism is a more popular form for terrorist because they don t have to use guns or bombs for destruction. Cyber Terrorism could be defined as the use of computing resources to intimidate or coerce others. To the FBI, Cyber Terrorism is defined as the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. But some people know cyber terrorism as information warfare which means the ability to unleash horror and devastation with a few well-aimed strokes on a computer keyboard.

Russel, a 25-year-old computer programmer from Stockholm, Sweden, had flown to Seattle in January 2006 to apply for a job with a company called JigSaw Security. To the young Swedenn, JigSaw promised the dream job. The company was clearly entrepreneurial—entrepreneurial enough to seek out the services of this skilled hacker who worked in an abandoned factory halfway around the world. They even promised to pay his airfare and to pick him up at the Seattle airport. At Russel's suggestion, the company encouraged him to bring along a fellow programmer, Micheal. When the two Swedenns arrived, their JigSaw hosts explained what they were looking for: a few good hackers who could break into the networks of potential customers as part of an effort to persuade those companies ...
Related Ads