Kryachkov 2!indd


(4) in the old Chinese saying: “Kill one


Download 2.42 Mb.
Pdf ko'rish
bet213/279
Sana27.10.2023
Hajmi2.42 Mb.
#1726813
TuriУчебник
1   ...   209   210   211   212   213   214   215   216   ...   279
Bog'liq
! DAKryachkov

_______ (4) in the old Chinese saying: “Kill one, _______ (5) ten thousand”.
While terrorism is an _______ (6) phenomenon, and historic techniques of assassination and 
conventional explosives remain the methods of choice, new elements of terrorism challenge the 
determination and patience of established states. 
The word ‘terrorism’ _______ (7) to mind a picture of bearded men throwing a pouch filled 
with explosives. But in the context of IT security, terrorists can _______ (8) in many forms such 


216
Д. А. Крячков
UNIT VII
as politically motivated, anti-government, anti-world trade, and pro-environmental extremists. If 
_______ (9) the opportunity, such activists would gladly _______ (10) trade and legislative agen-
das by _______ (11) a facility’s communication server, especially if the media were standing by to 
report what just happened. 
The term cyberterrorism was _______ (12) in 1996 and refers to the convergence of terror-
ism and _______ (13) The term has become widely _______ (14) after being embraced by the US 
Armed Forces. A report generated in 1998 was entitled “Cybercrime, Cyberterrorism, Cyberwarfare, 
Averting an Electronic Waterloo.” In this report, the probabilities of such activities affecting a na-
tion were discussed followed by a discussion of the potential _______ (15) of such attacks and 
methods to _______ (16) the likelihood of such events.
The threat that is _______ (17) by terrorist use of the internet is the _______ (18) of an ongoing 
controversial discussion. While some authors _______ (19) that, to date, not a single _______ (20) 
of cyberterrorism has been recorded, others argue that terrorists already routinely _______ (21) 
use of the internet. One _______ (22) for these differences in opinion is that neither terrorism nor 
cyberterrorism is a well-defined term. Instead, definitions of cyberterrorism _______ (23) from 
common use of the internet by terrorists (e.g., sending emails) to real criminal cases _______ (24) 
virtual or physical losses. The most commonly discussed use is a terrorist attack _______ (25) via 
the internet. Such an attack could be _______ (26) either at other IT-infrastructures, such as com-
puters, servers and routers or at objects in the ‘physical world’, such as buildings, planes, trains, 
or even human life. _______ (27) from such IT-based attacks, terrorists can use the internet to 

Download 2.42 Mb.

Do'stlaringiz bilan baham:
1   ...   209   210   211   212   213   214   215   216   ...   279




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling