Ad blocker interference detected!
Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers
Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.
This report presents a working definition for the term cyberterrorism, plus background information describing how current technology and management processes may leave computers exposed to cyberattack, and a discussion of possible effects of a cyberattack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyberattack; whether the need to detect possible cyberterrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyberterrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyberthreats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyberterrorism.
Appendices to the report explain technologies underlying computer viruses, worms, and spyware, how these malicious programs enable cyber crime and cyber espionage, and how tactics currently used by computer hackers might also be employed by terrorists while planning a possible cyberterror attack.