"Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--
Content Note
Is Cyberterrorism Distinct from Cyberwarfare and Other Cyberattacks? - Cyberterrorism Encompasses a Range of Online Activities That Support Terrorism - Digital Terrorism Really Exists - Cyberattacks Are Taken into Consideration on the US Government's State Terror List - There is Too Much Overlap Between Different Types of Cyberattacks to Effectively Distinguish Them - There Is No Clearly Discernible Difference Between Cyberterrorism and Cyberwarfare - Is Cyberterrorism a Significant Threat? - Cyberattacks on Ukraine's Power Grid Show Their Potential to Do Significant Harm - Cyberterrorist Attacks Can Be as Dangerous as Nuclear Attacks - Terrorist Organizations Are Recruiting Hackers with the Potential to Make Dangerous Attacks - Iran's Military Hires Hackers for Cyberattacks - Terrorists Use the Internet to Organize and Manipulate Public Opinion, Not to Attack - The Threat of Cyberterrorism Has Been Overblown by the Government and the Media - Cyberattacks Do Not Cause Enough Damage to Count as Acts of Terrorism or War - Should Governments Be Responsible for Preventing Cyberterrorism? - The UN and Various Countries Have Protocols and Positions on Cyberterrorism - International Political Cooperation Is Essential to Fighting Cyberterrorism - Mandatory Cybersecurity Standards Would Protect Businesses and Infrastructure - Active Defense Against Cyberattacks by Private Corporations and Organizations Could Do More Harm Than Good - The US Government Uses the Cyberterrorist Threat as as Excuse for Their Hacking - The Government Must Not Violate Privacy Rights in the Name of Cybersecurity - Active Self-Defense Is the Future of Cybersecurity - Is It Possible to Effectively Combat Cyberterrorism and Other Cyberattacks? - Technology Is Developing to Help Combat Cyberattacks - Blockchain Can Play an Important Role in the Future of Cybersecurity - By Acting Quickly, Hacking Victims Can Reduce the Amount of Damage Done - Although Challenging, It Is Possible to Attribute Many Cyberattacks - Online Attribution Is Sometimes Impossible Due to a Wide Range of Obstacles - Cyberattack Tools ARe More Widely Available Than Ever and Can Take Down High-Profile Targets. .