Paper Title
Cyber Terrorism and Criminal Policy Measures to Combat
Abstract
Cyber-crime, is an online crime, which includes crimes that occur in cyber space, it is true that the masses cannot be seen with the eyes, but in some cases it is possible to create numerous risks that cannot be compensated for years , to identify the types of attacks that occur in the virtual environment and learn how to deal with them and be conscious in your data protection is important. For the sake of being unknown in these attacks, By notifying others, these attacks can be fought better. On the other hand, according to the country's dependence on communications infrastructure and computer software, today and in the future, cyber warfare will be among the countries in which computer network technology is as the uncertain border between cyber warfare, cyber crime and cyber terrorism . IT and computer science form the strategic nature of all elements of vital infrastructure in modern civilization, therefore to be effective before the terrorist computer networks and communication systems for government and also to the extent of global scale, these elements are vulnerable infrastructure. The main objective of this paper is to identify and explain the phenomenon of cyber terrorism which is quite serious, so first defines cyber space that is a virtual environment, Cyber space features, that users worldwide can access any electronic information services, and the way of forming cyberspace crimes that are copy as the same, and types of the criminals, and perpetrators of cyber space as well as the flow of future cyber terrorism that is like normal terrorists who have political incentives to commit crimes. And define challenging crisis makers and so forth, and the end, will note shortly to Cyber and network and data security procedures and will submit recommendations and suggestions.
Keywords� Measures, cyber warfare, Cyber-terrorism, criminal policy.