This 5-page paper discusses cyberterrorism, what forms it takes, and how it can threaten businesses in the United States. Bibliography lists 2 sources.