Most studies to date have shown that critical information infrastructure is potentially vulnerable to cyber terrorist attacks. The increasing complexity of information systems creates new vulnerabilities and challenges for I.T management. Securing the information fractures will require a substantial effort of one 's report. They have yet witnessed the implications of a truly catastrophic cyber terrorism attack. A global strategy and policy for combating this type of terrorism are needed now( Kevin Coleman …show more content…
The forecast provides a developing use of inductive logic based on existing knowledge and trends in computer crime, criminal justice, and national security. There are two significant limitations to the forecast, which is the lack of empirical data and the inability to be precise in anticipating incidents of computer crime(Digital Crime and Terrorism). The judicial prosecutorial and investigative officials, as well as scholars and computer security specialist, are knowledgeable about cybercrime and show perform a comprehensive review of criminals and law procedures related to the crime of equipment. A few strategies that u.s could use to combat digital crime, and terrorism would be to Create a separate secure network with integrated security for the particular use of critical infrastructure systems with large-scale monitoring is a potential strategy(.Heritage.org). Information warfare, psychological applications, military deception, operations security and electronic warfare are used as the core capabilities for command and control. Developing threat scenarios for risk management, resiliency, recovery plans and prioritization is one possible approach(US Foreign Policy Challenges). A global policy and strategy for combating terrorism and digital crime would be a need