The first reason is that it’s cheap to terrorists. It’s cheaper because all they need is a computer that belongs to someone that feel has something valuable on it and an online connection. It does not cost to but a virus through a wireless connection, like it does to buy weapons. Second is unlike the terrorist old methods cyberterrorism is known to be unidentified. Meaning cyberterrorism’s use screen names to access things online and log in under a guess user to make it harder for police forces and others in catching them. Next is where the numbers are massive for the targets. Targets such as; computers, individuals, networks of governments, and such as public places. Forth would be the slightly showed cyberterrorism’s. Meaning that any feature that attracts to terrorists. These cyberterrorism attack only to things that catch their eye. The last one is what terrorists seem to want showed by the I LOVE YOU virus. These cyberterrorism’s affect the larger number of groups getting the Media’s attention (Weimann, 2004, p. 6). With the fear of cyberterrorism there is no way to ignore it since it’s overstated. With the use of private computers being weak to attack and with the U.S intelligence computer systems being isolated from the Internet, cyberterrorism has not yet been recorded (Weimann, 2004, p.
The first reason is that it’s cheap to terrorists. It’s cheaper because all they need is a computer that belongs to someone that feel has something valuable on it and an online connection. It does not cost to but a virus through a wireless connection, like it does to buy weapons. Second is unlike the terrorist old methods cyberterrorism is known to be unidentified. Meaning cyberterrorism’s use screen names to access things online and log in under a guess user to make it harder for police forces and others in catching them. Next is where the numbers are massive for the targets. Targets such as; computers, individuals, networks of governments, and such as public places. Forth would be the slightly showed cyberterrorism’s. Meaning that any feature that attracts to terrorists. These cyberterrorism attack only to things that catch their eye. The last one is what terrorists seem to want showed by the I LOVE YOU virus. These cyberterrorism’s affect the larger number of groups getting the Media’s attention (Weimann, 2004, p. 6). With the fear of cyberterrorism there is no way to ignore it since it’s overstated. With the use of private computers being weak to attack and with the U.S intelligence computer systems being isolated from the Internet, cyberterrorism has not yet been recorded (Weimann, 2004, p.