The IT Law Wiki
Line 1: Line 1:
 
A '''terrorist''' is an individual who seek to destroy, incapacitate, or exploit [[critical infrastructure]]s to threaten [[national security]], cause mass casualties, weaken the economy, and damage public morale and confidence. However, traditional terrorist adversaries of the United States are less developed in their [[computer network]] capabilities than other adversaries. Terrorists likely pose a limited [[cyber threat]]. The [[CIA]] believes terrorists will stay focused on traditional [[attack]] methods, but it anticipates growing [[cyber threat]]s as a more technically competent generation enters the ranks.
{{stub}}
 
 
 
A '''terrorist''' is an individual who seek to destroy, incapacitate, or exploit [[critical infrastructure]]s to threaten [[national security]], cause mass casualties, weaken the economy, and damage public morale and confidence. However, traditional terrorist adversaries of the United States are less developed in their [[computer network]] capabilities than other adversaries. Terrorists likely pose a limited [[cyber threat]]. The CIA believes terrorists will stay focused on traditional attack methods, but it anticipates growing [[cyber threat]]s as a more technically competent generation enters the ranks.
 
 
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Computer crime]]
 
[[Category:Computer crime]]

Revision as of 21:32, 9 January 2010

A terrorist is an individual who seek to destroy, incapacitate, or exploit critical infrastructures to threaten national security, cause mass casualties, weaken the economy, and damage public morale and confidence. However, traditional terrorist adversaries of the United States are less developed in their computer network capabilities than other adversaries. Terrorists likely pose a limited cyber threat. The CIA believes terrorists will stay focused on traditional attack methods, but it anticipates growing cyber threats as a more technically competent generation enters the ranks.