[ad_1]
Cyberwarfare and information terrorism—aggressive assaults on a government’s computers and IT infrastructure that lead to the copying or destruction of records and/or computer systems. Terrorist-sponsored computer hackers could bring down entire educational, economic, and governmental information networks if information terrorists are able to bypass built-in safeguards. By widening laws governing armed conflict to include cyberwarfare and allowing the United States to respond with force to any such threats to national security, Pentagon officials believe that this will send a message to hackers that they will be prosecuted and punished if they attack this country’s nuclear reactors, pipelines, or public networks such as mass transport systems (Pilkington, 2011). As of this writing, many people believe that the United States is particularly vulnerable to statesponsored cyberattacks, particularly from China and Russia.
The post By widening laws governing armed conflict to include cyberwarfare and allowing the United States to respond with force to any such threats to national security appeared first on Best Custom Essay Writing Services | EssayBureau.com.
[Button id=”1″]