Iwould take this opening to express gratitude my study supervisor, family and associates for their support and guidance without which this study would not have been possible.
I, [type your full first titles and last name here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for learned examination in the direction of any qualification. Furthermore, it represents my own attitudes and not inevitably those of the University.
Signed __________________ Date _________________
The research proposal attempt to illustrate cyber terrorism, which is becoming increasingly common in the popular culture, yet a solid definition of the word, seems hard to come by. While the saying is roughly defined, there is a large allowance of subjectivity in what precisely constitutes cyber terrorism. In an attempt to define cyber terrorism more logically, a study is made of definitions and attributes of terrorism and terrorist events. From these attributes a register of attributes for customary terrorism is developed. The online world and terrorism is synthesized to make a broader but more helpful evaluation of the promise impact of computer savvy
Terrorists. Most importantly, the concept of 'traditional' cyber terrorism, which features the computer as the target or the tool is determined to be only a limited part of the true risk faced.
CHAPTER 1: INTRODUCTION1
Background of the study1
Research Aims and Objectives3
CHAPTER 2: LITERATURE REVIEW5
Methods utilised by Cyber terrorists10
CHAPTER 3:PROPOSED METHODOLOGY12
Chapter 1: Introduction
Background of the study
The purpose of this study relates with cyber terrorism. As with cyber terrorism, the Al Qaeda training is still available 24/7 cheaply and globally on the internet despite the enactment of U.S. and coalition forces that raided and prohibited Al Qaeda camps in Afghanistan all through 2001 and 2002. It would be an understatement that efforts have not been made to undertake and/or command the websites which have seemingly made the inhabits of terrorists so much simpler than it would have ever been. However, the effectiveness of such approach without having an international body regulate the internet sites to halt terrorism is questionable. Thousands of videos are dispatched every second in the YouTube from all over the world, needless to mention the millions of gist and mails on Facebook. On this note, it is almost unrealistic to perfect each and every comment that is dispatched on such communal networks. Hence, an worldwide body to legalize the "standard" internet with secured content ought to be initiated. (Lewis 2002)
Then afresh, internet security cannot be made satisfactorily dependable by plainly scrutinizing the contents of websites and categorizing sites under "trusted". The "networking" game as previous cited becomes even more hazardous when it comes to distributing data through the sites which proceed unnoticed but are well adept of provoking thoughts. While it is hard to overcome the lure of flaunting my latest videos into these networking sites, I of course wouldn't like to be kept waiting until the obnoxious phrase "please delay for a couple of seconds while we reconsider your facts ...