This document discusses the characteristics of cyber terrorism and provides strategies for combatting it. It explores the use of the internet by cyber terrorists, different types of cyber terrorism, and their intentions. The document also suggests stricter security measures, the use of encryption systems, policy formation and compliance, and protection against insider threats as ways to combat cyber terrorism.