When I read articles which are related to cyber terrorism, I found that behind legal ways which we can prevent crimes in cyber spaces ,at this time there are some ways to protect a system completely which can never be accessed by anyone. Most of the governmental and military information is kept on secure databases (software) with no outside connection, to prevent any act which in case happens as a cyber terrorism act. Beside of these kinds of isolation, the major way which is certified by scientists for safe procedure of protection is encryption. Encryption is that it does not protect the entire system, an attack designed to disable the whole system, such as a virus, is unaffected by encryption.


Other way is the use of firewalls to screen all communications to a system, including e-mail

messages. Firewall is a common and familiar term for methods of filtering access to a network.

They may come in the form of a computer, router other communications device or in the form of

a network configuration. One method is to screen user requests to check if they come from a

previously defined domain or Internet Protocol (IP) address. Another method is to prohibit

Telnet access into the system.