ISIS Cyber-Warfare as A Terrorist Strategy

Why is this a terrorist strategy? Which terrorists use this strategic method? Why? When is this strategic method effective? Why? What are the flaws of this strategy? Why? and What infrastructures support the use of this method as part of a terrorist strategy? How and Why? Please make sure that these are the subtitle. Example: Why is Cyber-Warfare a terrorist strategy:

Leave a reply