Information Warfare and Cyberterrorism
Was Stuxnet different from previous cyber attacks (in terms of Stuxnet’s originality, implementation and consequences)? Is it, as some authors have commented, the start of cyber-warfare?
Assignment must be and have below Linked outcomes and the sources/references must not be old.
1. Cybercrime and Cyberterrorism.
2. Characteristics of Cybercrime
3. Characteristics of Cyberterrorism
4. Underpinning Architecture I: Vulnerabilities of Computer Systems
Criteria
Introduction
A concise lead-in to the essay, describing what will be covered.
Comprehension:
An understanding of the question. Awareness of concepts that need to be identified and evaluated in the essay.
Argument:
Addressing basic and subsidiary arguments. Argument is supported by evidence/examples. Argument utilises and integrates a number of sources.
Structure and Organisation:
Logical and clear structure (not rambling from point to point).
Expression, Grammar and Presentation:
Good sentence structure, concise writing and good grammar. Effective use of words.
References:
Full and correct referencing and adequate bibliography.