Cyber Terrorism vs. Physical Terrorism
In both attacks, the attackers do so outside the predictable combat as well as places that is not meant to bring them in direct contact with the law enforcement personnel. However, cyber terrorism entails the deliberate and malicious attack on information usually done through the computers (Janczewski & Colarik, 2008). On the other hand, physical terrorism entails the deliberate and intentional attack of people or areas where people are likely to be with an intention or harming them. The attack of Target Company is an example of cyber terrorism while the attack of the World Trade Center is an illustration of physical terrorism.
Bearing in mind that they are both different forms of terrorism, so will be the strategies for protecting and preventing them. While the cyber terrorism would be protected by using secure network channels as well as adapting passwords and firewalls to protect the computers from unwanted access, the physical terrorism entails the identification of terrorism amidst the populace for them to be arrested. In addition, having tight security at the entry points on the country would be a better strategy to ensuring that the terrorists are kept at bay (Janczewski, Colarik & Ebrary, 2005).
Worth noting is the fact that both forms of terrorism have negative effects on the populace. While the physical terrorism results to the loss of lives as well as damage to the infrastructures, the cyber terrorism as well damages information held in various organizations. As a result, they hinder the continuation of business since it needs information to take place something that goes a long way to affecting the economy of the country. From that elucidation, it would be concluded that no form of terrorism has more impact than the other although many may argue that the physical is since it involves the loss of lives (Janczewski & Colarik, 2008).
Reference
Janczewski, L., & Colarik, A. M. (2008). Cyber warfare and cyber terrorism. Hershey: Information Science Reference.
Janczewski, L., Colarik, A. M., & Ebrary, Inc. (2005). Managerial guide for handling cyber-terrorism and information warfare. Hershey PA: Idea Group Pub.