BuyFindarrow_forward

Fundamentals of Information Systems

8th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781305082168
Chapter 9, Problem 8DQ
Textbook Problem
355 views

Briefly discuss the potential for cyberterrorism to cause a major disruption in your daily life. What are some likely targets of a cyberterronst? What sort of action could a cyberterrorist take against these targets?

Program Plan Intro

Describe in brief the potential for cyberterrorism to cause a major disruption in your daily life. Mention some likely targets of a cyberterrorist and the sort of action that cyberterrorist could take against these targets.

Explanation of Solution

Cyberterrorism is an act of intimidating government organizations or civilian population to disable critical information infrastructure such as transportation, energy, telecommunication, banking and finance with the use of information technology for the political, religious or ideological gains.

Cyber terrorism can cause major disruption in one's daily life as it causes mentally stress as well as physical loss in the form of money, land or infrastructure. Cyber terrorists can hack into individuals bank accounts and steal their money, they can cause disruption in the transportation system or medical services which can immensely affect a person's day to day life. Any loss to the government organization is directly linked with the civilians as these organization's runs completely on the money of civilians which they provide in the form of taxes.

Cyberterrorism can be done from any location in world and can target any institution that is running on technology. These attacks can cause critical damage to the infrastructure and turn down the peace of any country. Some of the likely targets of cyberterrorism are mentioned as follows:

  1. Banking industry: Cyber terrorists can highjack the transaction system of banks and can make fraudulent transactions to steal money from the banks...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 9 Solutions

Fundamentals of Information Systems
Show all chapter solutions
add
Ch. 9 - What impact will the crimes PLA Unit 6134 have on...Ch. 9 - What are the potential military threats that PLA...Ch. 9 - Why did IBM instigate its sustainability programs...Ch. 9 - What goals should IT companies and large...Ch. 9 - What major achievements have IBM, HP, and Dell...Ch. 9 - What impact has IBM had on other companies both...Ch. 9 - Wasting time online costs U.S. businesses more...Ch. 9 - Preventing waste and mistakes involves...Ch. 9 - Few companies have found it necessary to limit...Ch. 9 - The ____________ is an alliance between the White...Ch. 9 - Convincing someone to divulge his or her logon...Ch. 9 - It is thought that the United States and...Ch. 9 - Child identity theft is a rapidly growing area of...Ch. 9 - It is estimated that over _________________ U.S....Ch. 9 - The LeadsOnline Web-based service uses Geographic...Ch. 9 - _____________ is a type of Trojan horse that...Ch. 9 - ______________ refers to the u of any of several...Ch. 9 - The _____________ is a fundamental concept of good...Ch. 9 - As opposed to the European Union, the United...Ch. 9 - Morals are one’s personal beliefs about right and...Ch. 9 - Heavy computer use can negatively affect one’s...Ch. 9 - The study of designing and positioning computer...Ch. 9 - Just because an activity is defined as legal does...Ch. 9 - Founded in 1977, the Association for Computing...Ch. 9 - What issues and problems are raised by the use of...Ch. 9 - What is US-CERT and what does it do?Ch. 9 - Define the term cyberterrorism.” For how long has...Ch. 9 - What is a managed security service provider? What...Ch. 9 - What is social engineering? What is dumpster...Ch. 9 - Why might some people consider a contractor to be...Ch. 9 - Give two reasons that Smartphone are such a ripe...Ch. 9 - How do you distinguish between a hacker and a...Ch. 9 - What measures can you take to avoid becoming a...Ch. 9 - What is a security dashboard? How is it used?Ch. 9 - What is smishing? What actions can you take to...Ch. 9 - What is filtering software? Why would...Ch. 9 - What does intrusion detection software do? What...Ch. 9 - What is ergonomics? How can it be applied to...Ch. 9 - What is digital rights management?Ch. 9 - What is a code of ethics? Give an example.Ch. 9 - Identify and briefly discuss several measures that...Ch. 9 - Identify and briefly discuss four specific...Ch. 9 - Briefly discuss software piracy. What is it, how...Ch. 9 - Imagine that you are starting a dating Web site to...Ch. 9 - Outline an approach, including specific techniques...Ch. 9 - Your 12-year-old niece shows you a dozen or so...Ch. 9 - What measures can you suggest to beef up the...Ch. 9 - Briefly discuss the potential for cyberterrorism...Ch. 9 - What is meant by the separation of duties? When...Ch. 9 - What measures must one take to avoid being a...Ch. 9 - Do you think that there is a difference between...Ch. 9 - Do research to identify the latest findings on the...Ch. 9 - Visit the Interact Crime Complaint Center at...Ch. 9 - Do research on the Web to find recent examples of...Ch. 9 - Visit the Web site of the Electronic Frontier...Ch. 9 - Request a current copy of your credit report from...Ch. 9 - You have been approached by the NSA to work in an...Ch. 9 - Do research to find any professional organization...Ch. 9 - What is net neutrality, and what does it mean for...Ch. 9 - What does net neutrality mean for governments?...Ch. 9 - Is the agreement of Comcast and Netflix in the...Ch. 9 - Is Comcast’s purported practice of surreptitiously...Ch. 9 - What privacy concerns docs transmitting healthcare...Ch. 9 - What requirement does HIPAA institute to safeguard...Ch. 9 - Universities use email to communicate private...Ch. 9 - How does Proofpoint safeguard patient privacy?...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
Convert the ERD from Problem 10 into a corresponding UML class diagram.

Database Systems: Design, Implementation, & Management

What is the purpose of layout fluid (dye)?

Precision Machining Technology (MindTap Course List)

How would you distinguish between e-commerce and e-business?

Principles of Information Systems (MindTap Course List)

A copper plate, with dimensions of 3 cm 3 cm 5 cm (length, width, and thickness, respectively), is exposed to...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

How many wires are normally connected to a double filament light bulb?

Automotive Technology: A Systems Approach (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

Describe circumstances that can initiate system development.

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Why is it important to find a good welding position?

Welding: Principles and Applications (MindTap Course List)