Step 1: Read at least three credible Web-based articles regarding Cyber-attacks. Make sure they are professionally-based articles and that you cite the articles you use.
Step 2: Post an initial response to each of the following questions (Initial post: minimum 400 words. Include a word count): What are two ways that terrorists may use the Internet, malicious code, or computer sabotage? For each method identified, what are the negative consequences that could result?
Sample Solution