Kryachkov 2!indd
(4) in the old Chinese saying: “Kill one
Download 2.42 Mb. Pdf ko'rish
|
! DAKryachkov
- Bu sahifa navigatsiya:
- ______
_______ (4) in the old Chinese saying: “Kill one, _______ (5) ten thousand”.
While terrorism is an _______ (6) phenomenon, and historic techniques of assassination and conventional explosives remain the methods of choice, new elements of terrorism challenge the determination and patience of established states. The word ‘terrorism’ _______ (7) to mind a picture of bearded men throwing a pouch filled with explosives. But in the context of IT security, terrorists can _______ (8) in many forms such 216 Д. А. Крячков UNIT VII as politically motivated, anti-government, anti-world trade, and pro-environmental extremists. If _______ (9) the opportunity, such activists would gladly _______ (10) trade and legislative agen- das by _______ (11) a facility’s communication server, especially if the media were standing by to report what just happened. The term cyberterrorism was _______ (12) in 1996 and refers to the convergence of terror- ism and _______ (13) The term has become widely _______ (14) after being embraced by the US Armed Forces. A report generated in 1998 was entitled “Cybercrime, Cyberterrorism, Cyberwarfare, Averting an Electronic Waterloo.” In this report, the probabilities of such activities affecting a na- tion were discussed followed by a discussion of the potential _______ (15) of such attacks and methods to _______ (16) the likelihood of such events. The threat that is _______ (17) by terrorist use of the internet is the _______ (18) of an ongoing controversial discussion. While some authors _______ (19) that, to date, not a single _______ (20) of cyberterrorism has been recorded, others argue that terrorists already routinely _______ (21) use of the internet. One _______ (22) for these differences in opinion is that neither terrorism nor cyberterrorism is a well-defined term. Instead, definitions of cyberterrorism _______ (23) from common use of the internet by terrorists (e.g., sending emails) to real criminal cases _______ (24) virtual or physical losses. The most commonly discussed use is a terrorist attack _______ (25) via the internet. Such an attack could be _______ (26) either at other IT-infrastructures, such as com- puters, servers and routers or at objects in the ‘physical world’, such as buildings, planes, trains, or even human life. _______ (27) from such IT-based attacks, terrorists can use the internet to Download 2.42 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling