Besides the cultures in countries being targets for these attacks, the industry sees a large amount of these attacks as well (See figure below). It is because of these trends, that cyber terrorism is a growing concern. [pic] http://www.breach.com/resources/whitepapers/downloads/WP_WebHackingIncidents_2008.pdf Science behind the Problem Since cyber terrorism, is internet based, it is difficult to determine one specific form of attack that hackers will use. Terrorism is shown as a threat of violence, maintenance of a condition of constant fear with the purpose of achievement of certain political or other purposes, compulsion
References: Barnett, R. Zone-H Defacement Statistics Report for Q1 2010 (2010) retrieved on November 10, 2010 from http://tacticalwebappsec.blogspot.com/2010/06/zone-h-defacement-statistics-report-for.html. Breach Security Annual Report (2009) retrieved November 10, 2010 from http://www.breach.com/resources/whitepapers/downloads/WP_WebHackingIncidents_2008.pdf Coleman, K Era of cyberterrorism may be a step closer. (2010). South China Morning Post,12. Retrieved October 13, 2010, from ProQuest Newsstand (Document ID: 2149115441). Golubev, V. Cyberterrorism as the new form of terrorism (2004) Retrieved October 13, 2010 from Martínez-Cabrera, A. Cybercrime costs firms $3.8 million yearly (2010) Retrieved October 13, 2010 from http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2010/07/26/BUT21EK1EQ.DTL. SearchSecurity.com definitions “cyber terrorism” (2007) Retrieved on October 13, 2010 from http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci771061,00.html. Sizemore, E. Cyber Terrorism: The Past, the Present, and the Future (2007) retrieved November 10, 2010 from http://www.associatedcontent.com/article/177180/cyber_terrorism_the_past_the_present_pg5.html?cat=37.