Definitions
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- noun A person who carries out
cyberterrorism .
Etymologies
Sorry, no etymologies found.
Support
Help support Wordnik (and make this page ad-free) by adopting the word cyberterrorist.
Examples
-
* Starts by talking about his brother the cyberterrorist who has political power.
State of Play 6 2009
-
Almost anyone under 30, though, has been trained in the skills that would allow him or her to be a cyberterrorist.
-
I mean, this -- it's very hard to hide when you -- when you're a cyberterrorist.
CNN Transcript - Special Event: Millennium 2000: Internet Future - January 2, 2000 2000
-
The author, a technical fellow at Microsoft and an expert on the Windows operating system, writes a thriller imagining what might happen when a cyberterrorist attack disables pretty much everything run by a computer, including airplanes and nuclear-power plants.
The Seattle Times 2011
-
That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.
InformationWeek - All Stories And Blogs Bob Evans 2010
-
That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.
InformationWeek - All Stories And Blogs Bob Evans 2010
-
That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.
TechWeb 2010
-
That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.
InformationWeek - All Stories And Blogs Bob Evans 2010
-
That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.
TechWeb 2010
-
That perception problem is then compounded by today's financial challenges and technological innovations: bottom-line performance is more essential then ever, and waves of new high-impact IT stuff-from the cloud to mobile to open source to China's rise as a global cyberterrorist-must be factored into IT strategies that are already crowded and complex.
InformationWeek - All Stories And Blogs Bob Evans 2010
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.