Computer network attacks by terrorists: some legal dimensions