Describe the ways cyber terrorists might operate.

Describe the ways cyber terrorists might operate.