⦁ Define the difference between cyberterrorism and other forms of cybercrime.
⦁ Discuss the role of the media in the (mis)understanding of what constitutes cyberterrorism.
⦁ Understand the vulnerability of critical infrastructures to cyberterrorism.
⦁ Differentiate between the four steps of the emergency/risk management process.
⦁ Apply the risk management procedure to critical infrastructure.