Hackers use malware that is capable of spreading on its own, to scan the Web, to locate systems that are vulnerable and target them to exploit loopholes in security engineering of websites or systems. To ensure that the systems are not subjected to such attacks, experts try to understand how the people on the other side are working and set up honeypots, which are part of web systems and keep a track of attacks that have been attempted.
Since such attacks are directed towards countries' defense websites and other politically sensitive areas, these honeypot systems have been modified to even redirect attacks on any particular system to a computer located externally in order to analyze the attack. The external computers will also help the experts to trace the cyber terrorists and stall their activities before they can launch a intensive attack which can debilitate the entire security, defense or financial systems of a particular organization.
As the Internet is without any borders and is not subjected to a particular legislative process, it is very difficult for nations to ensure that their secrets do not fall prey to cyber terrorists’ acts. Even terms such as Trojan, malware, bot-net, phishing etc. are becoming common, cyber terrorist in fact refers to sabotage of the international community's commercial or defense interests. Behind every Internet outage, there is a illegal intent, even as nations also are indulging in attacks which are in fact IT’s contribution towards terrorism. Experts in the field have suggested introducing international efforts to bring down the cyber terrorism. Since the Internet is playing a pivotal role in business transformation, any attempt to counter cyber terrorist should take into account this role of the web.