|
Jun 01, 2025
|
|
|
|
CRJ 305 - Intro. to Cyber Terrorism Credits: 3 Lecture Hours: 3 Lab Hours: 0 Practicum Hours: 0 Work Experience: 0 Course Type: Open This course explores methods cyber terrorists use to plan, communicate, fund and ultimately wage cyber attacks. Students will consider motivators of prospective actors as well as identify the associated risks to critical infrastructure and key resources through scenarios and case studies. Lastly, an overview of policy and procedural/technical measures will allow participants to consider possible means to protect and defend vulnerable public and private resources. Competencies
- Understand the current issues, trends, and problems with cyber terrorism and cyber crime
- Define why cyber-attacks may be underreported
- Illustrate the reasons for the increase in cybervictimization
- Identify terrorists use of computer technology
- List the different ways terrorists use the Internet
- Summarize the components of information warfare
- Elaborate the threat of money laundering and terrorist financing
- Contrast the difference between money laundering and terrorist financing
- Discuss how terrorists may use cryptocurrencies to finance terror
- Evaluate the use and danger of malware cyber-attacks
- Categorize the different types of malware and denial of service attacks
- Classify the potential harm caused by malicious code and other cyber-attacks
- Distinguish how terrorist and criminal organizations use the Deep Web
- Compare the differences between the Surface, Deep, and Dark Webs
- Examine the use of Tor Net to access the Deep Web
- Analyze domestic and foreign threats against critical infrastructures
- Outline the potential risk for cyberterrorism against critical infrastructure
- Illustrate the United States reliance on critical infrastructure and the national security vulnerabilities that it triggers
Competencies Revised Date: AY2025
Add to Portfolio (opens a new window)
|
|