Author:Veerasamy, Namosha; Grobler, M; Von Solms, BDate:Jul 2012Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, ...Read more