More Detail Here: Cyber Security Consulting Submitted by: Robert Ing A terrorist has two prime objectives; to obtain information and to disable a target at any cost. A personal computer user could unknowingly assist a terrorist in accomplishing these objectives but it doesn’t have to be this way. Information Approximately