Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
AI
The rising threat of cyberterrorism poses significant risks to critical infrastructure and national security, as attacks can be executed from anywhere in the world, endangering essential services such as power, finance, and information systems. This paper discusses the vulnerabilities to cyberattacks, the motivations and capabilities of potential attackers, and the necessity of international cooperation for countering cyberterrorism, while proposing a framework to address these challenges in comparison to conventional forms of terrorism.
As the addiction of internet is increasing at a highly increasing rate from our mobile phones to our streets, from our streets to our colleges, from our colleges to our work places, from our work places to our hospitals and from our hospital to everywhere, the risks caused by cyber terrorism has also increased. During the past few decades, the threats posed by cyber terrorism have increased to a deadly rate. It has raised a question mark to the Government's security policies and agendas. This caused Government agencies to revise their security policies. It has raised awareness of the other channels that terrorists might be adopting to accomplish their ambitions. These attacks are planned to cause severe economic damage to someone and even in some cases it harms someone's life. This research is designed for a clear understanding of a layman what cyber terrorism exactly is
When we think of technology, what often comes to mind are televisions, communications devices such as cell phones and satellites, computers, and different modes of transportation? Various operational deliberations associated with “weaponizing” the basic technology of cyber attack. This paper is relevant both to the attacker, who uses cyber attack as a tool of his own choosing, and to the defender, who must handle with and respond to incoming cyber attacks launched by an attacker. However, there are other ways in which technology is applied, one of those being the Internet and its various components including email, chat rooms, and search engines. The list of uses for the Internet is innumerable and many corporations and universities are forcing people to make use of it. But no matter how much this new technology is forced on us, people are still resistant to it.
Impact Factor(JCC): 1.1947-This article can be downloaded from www.bestjournals.in ABSTRACT In recent years the convergence of religious fundamentalism and political activism has been a disturbing trend. Terrorists mostly target for most impact in conjunction of loss of life. However the terrorist first engages in targeting the violence against a country which is powerful and later it can be towards symbolic representation of technical advancement and power. Such instances are many to quote. Subsequently the terrorists targets towards technical advancement to endanger technical ability of a nation. Terrorist activities which is an innovation through implementation of technology by these terrorist in the age of information by giving it a new version—'techno-terrorism' and cyber terrorism. 'Cyber Terrorism' is the new form of terror that has to do more with 'information attacks' on a nation's computer system and information and infrastructure. Computers are the most modern crime contrivance today. The other testing legal question is when does internet activity involves actus reus.? it will prove difficult who had the thought first—the person or the machine. Finally, the authors discuss the impact of this new dimension of cyber terrorism-has on the public at large and the governments in the way in which one should build one's defenses and counter this new dimension of cyber terrorism.
IEEE Technology and Society Magazine, 2000
2011
The nature of computer network attacks raises many interesting dilemmas for modern armed forces, not least of which involve the principle of distinction and the permissible targets of attack. As a general proposition, it is prohibited to direct computer network attacks against civilian objects in the same manner that a conventional attack would be prohibited. Thus attacks against oil pipelines, civilian air traffic control or rail networks, emergency response networks, financial institutions and other civilian objects are prohibited. However, computer network attacks raise two particular issues for the law of targeting. 1 First, computer network attacks do not necessarily result in physical damage, death or injury, thus opening a range of possible targets for attack which might otherwise be unreachable because traditional means would cause excessive collateral damage. A second and related point is that computer network attacks can be designed to result in a range of outcomes, allowing the attacker to merely disable or neutralise a particular target without causing permanent damage or destruction. Such computer network operations may not even rise to the level of an attack at all.
sites.google.com
2018
As the new age approaches, our society is increasingly becoming dependent upon information technology. However, as technology can deliver a number of pros, it also introduces new cons that can be exploited by persons with the necessary technical skills. The paper discusses the problems posed by hackers and information compromisers considers the kind of responses necessary to protect our society.
Cyberterrorism is a growing global concern. Since computers control the majority of the developed world’s infrastructure, it is easily penetrated by dedicated hackers. Cyber-attacks can create enormous damage at very little cost to terrorists. Cyberterrorism concerns activity that utilizes electronic communication networks to further unlawful and violent ends.
Terrorism, one of the vilest crimes, faced by the human community has posed an immense challenge in the post Cold War period. It has existed since the emergence of human societies endangering innocent lives and jeopardizing human rights and fundamental freedoms. Though the conventional motives have remained the same, the traditional concepts and methods of terrorism have taken new dimensions that are more destructive 1 and deadly in nature. In the age of information technology the terrorists have acquired an expertise to produce the most deadly combination of weapons and technology, which are much more modern and scientific. This phenomenon where the cyber space is used to launch terror attacks is also known as cyber-terrorism. It has the potential to do indeterminable harm not only by paralyzing computer infrastructures but also comprehending the use of the cyberspace to support and organize traditional forms of terrorism, such as bombings and suicide attacks. It also poses a deadly threat on the national security of a state by offering a garb of anonymity to the perpetrators of terror. The increased dependency on information technology has dramatically increased the security risks. This new menace will be a severe challenge to global security unless there are appropriate security measures to help prevention. Hence, to understand cyber terrorism, and find out the ways in which the terrorist organizations are using the advantage of this new technology, a look at its background is necessary. This paper shall make an attempt to discuss the rising incidents of cyber terrorism across the globe, the meaning and concept of the term, the motives and methods behind an attack. It shall also discuss the regional and international mechanisms to prevent cyber terrorism, and recommend what more could be done.
Terrornomics, 2007
Reports of cyber-terrorism are a regular feature of today's news. While such accounts are commonplace, to the best of our knowledge no computer attacks carried out by terrorists against critical infrastructure have occurred to date. 1 Though data collection on cyber-terrorism is fraught with obstacles, by and large media, industry, and government reports have yet to reveal substantial evidence that terrorists are systematically exploiting weaknesses in information systems. Yet, despite all the talk about cyber-terrorism, scant attention has been given to the seemingly mundane-though most definitely actual and disquieting-use of the Internet and currently available information technologies by terrorists. By examining the background and trends in cyber-crimes, and detailing what is presently known about terrorist uses of information technologies and the Internet, a 1 Experts agree that there have been no cyber-attacks by terrorists as of yet: "While there is no published evidence that terrorist organizations are currently planning a coordinated attack against computers, computer system vulnerabilities persist worldwide and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown" (Wilson, 2005). "However, to date, there is no published evidence linking a sustained or widespread attack using CNA with international terrorist groups" (Arquilla and Ronfeldt, 2001). Although cyber-attacks have caused billions of dollars in damage and affected the lives of millions, few if any can be characterized as acts of terrorism-fraud, theft, sabotage, vandalism, and extortion, yes; but terrorism, no.
For as long as Internet exists, jurists and lawyers have tried to convince the public and sometimes we should add also themselves that Internet is not an outlaw region, a new far west whereas the civilization’s rules cease to apply. However, now more than ever it has become obvious that every internet user is susceptible to become the victim of various forms of attacks from unknown sources, most of the time with unknown means and with any trace to the criminal. While the terms virus, hacking and even cracking have become very familiar to the public, the new evolution of the cybercriminality’s activity are for now much less known: what are exactly the romance scam, the scareware and ransomware? And what does it tell us about the actual mutations of the cybercriminal profile? This is the topic of this paper.
2018
The idea that terrorists could cause massive loss of life, worldwide economic chaos and devastating environmental damage by hacking into critical infrastructure systems has captured the public imagination. Air traffic control systems, nuclear power stations, hospitals and stock markets are all vulnerable targets for cyber-terrorists wanting to wreak havoc and destruction. Counter-terrorism investigation in Europe have shown that the use of the Internet is an integral component in any terrorist plot. Terrorist groups are resorting to encryption and anonymising tools in order to keep their identities hidden while they communicate, plan attacks, purchase illegal materials and perform financial transactions. The possibility of an act of cyberterrorism against critical national infrastructure requires serious attention from legislators. There is no concrete legal definition of cyberterrorism internationally. A wide range of possible cyberattack scenarios exists - including acts of hacktivism against websites - and it is not clear which of these scenarios would fall within definitions of terrorism under domestic law. While terrorists continue to use the Internet mostly for communication, propaganda and information sharing purposes, their capabilities to launch cyberattacks remain limited.
Cyber-threats can range from minor electronic crimes to more sophisticated fraud and the infiltration and compromise of systems, networks and supply chains causing significant damage and harm. Cyber-threats are actioned by more than terrorists; actors who engage in cyber-threat activities and events vary from individuals, corporations involved in industrial espionage, criminals and criminal enterprises, terrorists and terrorist organizations and even nation states; recent reports indicate that Russian forces hacked a U.S. surveillance drone flying over the Crimea region of Ukraine in March 2014 by allegedly severing the connection between the drone and its operator using an undisclosed, complex radio-electronic technology, resulting in its interception. These asymmetrical characteristics are distinctly different than that of conventional threats, requiring specialized, “cutting edge” skills to prevent, detect, respond and recover. The Internet has added a level of ambiguity and comp...
The article overviews the landscape of general cyber-attacks, out of which it focuses on three of the most prevalent and most destructive threats: phishing scams, malware, and DDoS. Phishing, on the other hand, relies on the exploitation of human psychology as it tricks users into revealing sensitive information, many times by sending devious emails, websites, or messages. The discussion then covers malware, pointing out numerous types like viruses, trojans, spyware, and the techniques to be followed in order to detect and disable them. Finally, the article covers DDoS, a type of attack in which the system is submerged in enormous traffic that serves to unblock service and financial losses. Of particular note are user awareness, continuous research, and the use of advanced security technologies, such as AI and machine learning.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.