Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
23-09-2008, 01:26 AM


Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us,it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least.

The difference between the conventional approaches of terrorism and new methods is primarily that it is possible to affect a large multitude of people with minimum resources on the terrorist's side, with no danger to him at all. We also glimpse into the reasons that caused terrorists to look towards the Web, and why the Internet is such an attractive alternative to them.

The growth of Information Technology has led to the development of this dangerous web of terror, for cyberterrorists could wreak maximum havoc within a small time span. Various situations that can be viewed as acts of cyberterrorism have also been covered. Banks are the most likely places to receive threats, but it cannot be said that any establishment is beyond attack. Tips by which we can protect ourselves from cyberterrorism have also been covered which can reduce problems created by the cyberterrorist.

We, as the Information Technology people of tomorrow need to study and understand the weaknesses of existing systems, and figure out ways of ensuring the world's safety from cyberterrorists. A number of issues here are ethical, in the sense that computing technology is now available to the whole world, but if this gift is used wrongly, the
consequences could be disastrous. It is important that we understand and mitigate cyberterrorism for the benefit of society, try to curtail its growth, so that we can heal the present, and live the future?
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 9
Joined: Jan 2010
11-01-2010, 05:53 PM

please post me 15 to 20 pages documentation on this topic...thanqSmile
computer science topics
Active In SP

Posts: 610
Joined: Jun 2010
16-06-2010, 07:38 PM

hey please read this also to get idea of Cyberterrorism
As the Internet becomes more pervasive in all areas of human activity , individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring.
As the Internet continues to expand, and computer systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat.Cyberterrorism can have a serious large-scale influence on significant numbers of people. It can weaken countries' economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack.Cyberterror can also affect internet-based businesses. Like brick and mortar retailers and service providers, most websites that produce income (whether by advertising, monetary exchange for goods or paid services) could stand to lose money in the event of downtime created by cyber criminals.As internet-businesses have increasing economic importance to countries, what is normally cybercrime becomes more political and therefore "terror" related.

for more info please read
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1
Joined: Jul 2010
25-07-2010, 12:36 AM

i wanna know more about this subject,so kindly help me.
Active In SP

Posts: 153
Joined: Aug 2010
18-08-2010, 11:21 AM

More information is available at:

and the presentation is available at:
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
09-04-2011, 04:07 PM

.docx   Contents.docx (Size: 41.38 KB / Downloads: 56)
The term cyberterrorism is becoming increasingly common in the popular culture, yet a soliddefinition of the word seems hard to come by. While the phrase is loosely defined, there is a largeamount of subjectivity in what exactly constitutes cyberterrorism. In the aftermath of the September11th attacks, this is somewhat disconcerting. In an attempt to define cyberterrorism more logically, a study is made of definitions and attributes ofterrorism and terrorist events. From these attributes a list of attributes for traditional terrorism isdeveloped. This attribute list is then examined in detail with the addition of the computer and theInternet considered for each attribute. Using this methodology, the online world and terrorism issynthesized to produce a broader but more useful assessment of the potential impact of computersavvy terrorists. Most importantly, the concept of ‘traditional’ cyberterrorism, which features thecomputer as the target or the tool is determined to be only a limited part of the true risk faced. Finally, the authors discuss the impact this new view of cyberterrorism has on the way in which oneshould build one’s defenses. In particular, the breadth of the issue poses significant questions forthose who argue for vertical solutions to what is certainly a horizontal problem. Thus, the validity ofspecial cyberterrorism task forces that are disconnected or loosely connected with other agenciesresponsible for fighting the general problem of terrorism is questioned, and a broader, more inclusivemethod suggested. Keywords: cyberterrorism, terrorism, computer security√ Introduction If you ask 10 people what ‘cyberterrorism’ is, you will get at least nine different answers! When those10 people are computer security experts, whose task it is to create various forms of protection against‘cyberterrorism’, this discrepancy moves from comedic to rather worrisome. When these 10 peoplerepresent varied factions of the governmental agencies tasked with protecting our nationalinfrastructure and assets, it becomes a critical issue. However, given the lack of documentedscientific support to incorporate various aspects of computer-related crime into the genre‘cyberterrorism’, this situation should not be surprising.Despite copious media attention, there is no consensus methodology by which various actions maybe placed under the nomenclature ‘cyberterrorism’, yet the term clearly exists in common usage.The term, first coined in the 1980s by Barry Collin (Collin, 1997), has blossomed in the last severalyears: “Protect yourself from the cyberterrorist”; “Insure yourself against cyberterrorism”; “Fundingforthcoming to fight cyberterrorism” (Hamblen, 1999; Luening, 2000).All of these sound nice, but the reality is that the reader, solution provider, or defender is often left tohis own devices as to what the term actually means and thus what solutions should be created (orimplemented). When a government’s or corporation’s entire infrastructure may be at stake,subjectivity is useful but may not be the best evaluative tool.At the same time, research of this phenomenon shows that cyberterrorism cannot easily be defined.This creates a Catch-22 situation: the thing cannot be defined — yet without defining it, one cannot‘know’ what it is one is fighting and hence come up with a good solution. Furthermore, even whenthere is an operational agreement on terms, if an attack/security event does not fit into one of the(often narrowly defined) categories, funding (and consequently investigation or technical remedy)may not be forthcoming.3Symantec
For example, recently terrorists used a computer in Delray Beach, Florida to make their travel plansand purchase tickets, as well as using public library computers in the same town (Holland, 2001).How large the role computers played in the organization and execution of the attacks is, at this point,unclear, but the conclusion is obvious: computers and, in particular, the Internet, played a key role inthe execution of the September 11th attacks. This concept is critical in evaluating the true problemwe face in the virtual world: the use of computers in terrorist acts. While there are possible technicalsolutions that would have made this particular scenario more difficult, this task does not currently fallunder the auspices of any government agency tasked with fighting cyberterrorism. Furthermore, aseach of the actions cited above was not necessarily illegal prior to the attack, detection andprevention is made all the more difficult.The most widely cited paper on the issue of Cyberterrorism is Denning’s Testimony before the SpecialOversight Panel on Terrorism (Denning, 2000). Here, she makes the following statement:Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood tomean unlawful attacks and threats of attack against computers, networks, and the informationstored therein when done to intimidate or coerce a government or its people in furtherance ofpolitical or social objectives. Further, to qualify as cyberterrorism, an attack should result inviolence against persons or property, or at least cause enough harm to generate fear. Attacksthat lead to death or bodily injury, explosions, plane crashes, water contamination, or severeeconomic loss would be examples. Serious attacks against critical infrastructures could be actsof cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or thatare mainly a costly nuisance would not.While Denning’s definition is solid, it also raises some interesting issues. First, she points out that thisdefinition is usually limited to issues where the attack is against “computers, networks, and theinformation storied therein”, which we would argue is ‘pure Cyberterrorism’. Indeed, we believe thatthe true impact of her opening statement (“the convergence of terrorism and cyberspace”) isrealized not only when the attack is launched against computers, but when many of the other factorsand abilities of the virtual world are leveraged by the terrorist in order to complete his mission,whatever that may be. Thus, only one aspect of this convergence is generally considered in anydiscussion of cyberterrorism — an oversight that could be costly. Second, it is very different from thedefinition that appears to be operationally held by the media and the public at large.Given the Augean task of attempting to define cyberterrorism, one way we might approach the task ofunderstanding it is to throw away the very idea of defining it at all, and instead begin by breaking itdown into its fundamental elements — each of which can be examined and used as a foundation fordeveloping solutions which may be technical, legal, social, educational, or policy driven. After all, aword is meaningless in and of itself — it is only the relational concepts that the word conveys thatimbue the utterance with meaning. As ‘cyberterrorism’ relates to ‘terrorism’ a logical first step might be to look at the functional elementspresent in some operational definitions of ‘terrorism’1.The United States Federal Bureau of Investigation (FBI) defines terrorism as, “The unlawful use offorce or violence, committed by a group(s) of two or more individuals, against persons or property, tointimidate or coerce a government, the civilian population, or any segment thereof, in furtherance ofpolitical or social objectives.” (FBI, 2002).4Symantec
The United States Department of Defense (DOD) defines terrorism using a slightly broader brush,calling it “the unlawful use of, or threatened use, of force or violence against individuals or property,to coerce and intimidate governments or societies, often to achieve political, religious or ideologicalobjectives” (DOD, 2002).The United States Department of State (DOS) definition states that terrorism is “premeditated,politically motivated violence perpetrated against noncombatant targets by sub national groups orclandestine agents” (DOS, 2002). These varied operational definitions exist as a function of the individual organizational roles and taskswhich are assigned to employees/agents. Thus, as these roles and tasks vary, the concepts ofterrorism continue to vary.√ The terrorism matrixWhen terrorism is examined in view of these definitions, there are some pervasive elements: people(or groups), locations (of perpetrators, facilitators, victims), methods/modes of action; tools, targets,affiliations, and motivations2Examples are shown in Figure 1, using two groups designated as terrorist .groups by

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: electronic seminar on cyberterrorism, cyber technology seminar topics, computer systems to help reduce the terrorism, cyberterrosim seminar documentation, a presentation seminar on cyber terrorism, cyber terrorism seminar topic, seminar cyber terrorism,
Popular Searches: cyberterrorism documentation ieee format, drilling bit nomenclature, cyberterrorism computer seminar abstract, cyber terrorism paper presentation in ieee format for free download, info ask elec com loc es, seminar topic cyberterrorism presentation, computer systems to help reduce the terrorism,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Botnets, Cybercrime, and Cyberterrorism seminar ideas 0 581 07-05-2012, 11:43 AM
Last Post: seminar ideas