Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us,it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least.

The difference between the conventional approaches of terrorism and new methods is primarily that it is possible to affect a large multitude of people with minimum resources on the terrorist's side, with no danger to him at all.

The growth of Information Technology has led to the development of this dangerous web of terror, for cyberterrorists could wreak maximum havoc within a small time span. Banks are the most likely places to receive threats, but it cannot be said that any establishment is beyond attack.

We, as the Information Technology people of tomorrow need to study and understand the weaknesses of existing systems, and figure out ways of ensuring the world's safety from cyberterrorists. A number of issues here are ethical, in the sense that computing technology is now available to the whole world, but if this gift is used wrongly, the consequences could be disastrous. It is important that we understand and mitigate cyberterrorism for the benefit of society, try to curtail its growth, so that we can heal the present, and live the future…

Terrorism poses an undeniable threat, but is the same true of "cyberterrorism"? Can terrorists and malicious hackers remotely commandeer or disrupt critical networks and infrastructure like electrical grids, key financial networks, and water supply systems, or are those threats overblown? If such theats are plausible, might they be carried out instead of, or as part of, a physical attack? What are the relative risks of physical threats and cyberthreats, and how much attention does cybersecurity deserve in the broader expanses of national, corporate, and personal security? Does government have a role, or should the private sector handle cybersecurity through better management and innovations such as insurance and security outsourcing? Let us all engage a discussion of threats to digital—and physical—security