This book describes cyberattacks which have occurred and the various techniques used, and examines the likelihood of cyberterrorism threatening national and international security.