Across
- 5. This type of warfare often involves propaganda and disinformation campaigns
- 8. According to the October 2002 InfoWorld article, the following system is vulnerable to attack
- 9. The NSA and ______ have allegedly had one of their cyber spies caught
- 10. Using the Internet to terrorize someone or some group of individuals
Down
- 1. Cyber terrorism is differentiated from other cyber crimes because it is usually politically or ______ motivated
- 2. This type of loss is the most likely damage to occur in an act of cyber terrorism
- 3. This conflict in 1990 had a cyber warfare component
- 4. A political group that has used the internet for political intimidation
- 6. This virus is an example of domestic cyber terrorism
- 7. Hacking conducted for ideological purposes
