<P> Cyberterrorism in general can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda piece in the Internet that there will be bomb attacks during the holidays can be considered cyberterrorism . There are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc . </P> <P> Cyber-extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers . These hackers demand money in return for promising to stop the attacks and to offer "protection". According to the Federal Bureau of Investigation, cyber-extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service . More than 20 cases are reported each month to the FBI and many go unreported in order to keep the victim's name out of the public domain . Perpetrators typically use a distributed denial - of - service attack . </P> <P> An example of cyberextortion was the attack on Sony Pictures of 2014 . </P> <P> The U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a national - level concern through several recent events of geo - strategic significance . Among those are included, the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers . "In August 2008, Russia again allegedly conducted cyberattacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia . The December 2015 Ukraine power grid cyberattack has been also been attributed to Russia and is considered the first successful cyberattack on a power grid . Fearing that such attacks may become the norm in future warfare among nation - states, the concept of cyberspace operations impacts and will be adapted by warfighting military commanders in the future . </P>

Which of the following are the two essential feature of cyber crime