A physical assault
One of the three types of cyber-terrorism, aims to compromise hardware dependability by employing conventional weapons. The technique targets machinery and installations like computer facilities and transmission lines. The deliberate action is primarily motivated by a political goal to obstruct information processing and flow.
The goal of the second technique
Which uses electromagnetic pulses, is to disrupt data transmission and harm computer hardware. The method makes use of electromagnetic energy's ability to disrupt software, erase electronic memory, and disable electronic components. While electromagnetic pulses will have minuscule impacts of critical infrastructures because of dynamicity and cushiony developments in electronic and electrical devices, jamming communication and overheating circuitry would result in total system breakdown, disrupting the integrity of data and reliability of computer systems.
The third approach of executing cyber network attacks
Is corrupting or stealing data. It is the most damaging method, where DOD notes that the harmful potentiality arises from the disruptive power of malicious code, which not only gives the adversary tremendous advantages but can also be a source of unprecedented consequences. The method utilizes malicious codes to disrupt instruction logic and computer processing code. It can also be directed to digital data and intellectual property, a move that exploits weak points in software, system configuration, and security practices (Linden, 2007, p.5). The strategy focuses on gaining entry to restricted computer systems as well as violating the patent, copyright laws, or trade secrets. The crime entails espionage to make copies of classified data without any authorization. The ultimate goal hacking is causing economic damage through disrupting reliability of computer systems and networks, as well as intimidating the government and the public through threats of exposing confidential communications and data.
Opinion on Nature of Attacks Cited by Dorothy Denning in Chapter 4
While the highlighted incidents are bold moves intended to offset technological superiority, they do not capture the notions of cyber-terrorism. Instead, they represent attempts by adversaries to exploit the power of digital tools in recruitment, communication, resource mobilization, and achieving organizational efficiencies. The observation arises from the fact that attacks, such as the case of disrupting media operations serve to address interference by the government and press firms. While they disrupt service delivery and cause confusion in public space, attacks on telecommunication facilities and networks do not culminate to psychological effects associated with terror violence and mass killings (Linden, 2007, p.76).
References
Linden, E. (2007). Focus on Terrorism. Vol. 9 (1st ed., pp. pp. 1-42 (Clay Wilson), pp. 71-76 (Dorothy E. Denning). Hauppauge, New York: Nova Science Publishers Incorporated.