Executive Summary 2
Introduction 3
History 4
Nature of Cyber Terrorism 5
Strategies 7
Victims and damage caused 8
Methods of Attack 9
Existing laws (Australian and International) and their shortcomings 10
Other issues in the field 14
Counter measures 16
Conclusion/Findings 19
References 21