cyberterrorism

Type: 
Topical Term
Subfield: 
a
Alias: 
cyberterrorism

The eye of minds

"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"--Provided by publisher.

Careers as a cyberterrorism expert

An introduction to jobs focused on preventing incidents of cyberterrorism, including options within the government, military, and the law, and describing the skills, knowledge, outlook, and habits required to achieve success as a professional.

Cyberattacks

2024
"The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them"--Provided by publisher.
Cover image of Cyberattacks

Spotting online scams and fraud

2024
Scammers adopt fake identities and use them to defraud people using texts, emails, social media sites, ecommerce sites, dating apps, and banking apps. Scammers can operate from almost anywhere in the world and in most cases victims have little chance of getting their money back.

Trojan horse

"The US military is under cyberattack. Computer failures have crippled every weapons system. Gizmo and Invisible Six must discover who is behind this attack and the culprits' aim. But the mysterious hackers seem one step ahead of I-6 at every turn, and their use of autonomous weapons keeps I-6 from getting close. Can Gizmo and I-6 stop the worst cyberattack in US military history? Aligned to Common Core Standards and correlated to state standards. Claw is an imprint of Magic Wagon, a division of ABDO."--.

The cool code

2023
"When the coding club finds that their app has a malicious user, Morgan, Zoey, and Daniel code an update to contend with a mischievous AI llama that's guiding a not-so-popular kid named Marcus to cause chaos in the school. Annoying little siblings, chaotic pranks, and more abound as they race to repair the glitchy app--and their own friendships--in their school before the damage is irreversible"--Provided by publisher.

Cyber tech in warfare

2023
"Cyber technology--or cyber tech--is a major part of warfare, but it might seem too complex or complicated for young people to understand. However, with the help of this . . . comprehensive guide to military cyber tech, readers can become experts on this . . . STEM topic"--Provided by publisher.

LikeWar

the weaponization of social media
2019
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away"--Provided by publisher.

Cyber mobs, trolls, and online harassment

As young people continue to share more of their lives online, social media opens up increasing opportunities for international dialogue, but it also means they run the risk of encountering the problematic parts of a virtual community, such as cyber mobs, bullies, and trolls. This thoroughly researched text takes a deep dive into these issues, examining the reasons they happen, common ways to identify them, and tips for protecting oneself from becoming a victim. Readers use full-color photographs, quotes from experts, sidebars, and discussion questions to develop a comprehensive overview of online issues and take precautions in their digital life.

Cyberterrorism

"Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--Provided by publisher.

Pages

Subscribe to RSS - cyberterrorism