You are reading Cyberterrorism: concept, terms, counteraction. You can leave a comment or trackback this post.
| M | T | W | T | F | S | S |
|---|---|---|---|---|---|---|
| « Jun | Sep » | |||||
| 1 | ||||||
| 2 | 3 | 4 | 5 | 6 | 7 | 8 |
| 9 | 10 | 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 | 21 | 22 |
| 23 | 24 | 25 | 26 | 27 | 28 | 29 |
| 30 | 31 | |||||
Posted on August 22nd, 2004 by .
Categories: International Terrorism.
Cyberterrorism: concept, terms, counteraction
“Cyberterrorism, in our opinion, should be regarded as deliberate attack on information processed by computer, computer system or network that endangers life and health of people or causes other grave consequences, if these actions were committed with the purpose of public security breach, to intimidate or coerce a civilian population or to provoke an armed conflict.”
0 comments.
Comments can contain some xhtml. Names and emails are required (emails aren't displayed), url's are optional.