Cyber Security Countermeasures to Combat Cyber Terrorism
نویسندگان
چکیده
منابع مشابه
Discovering Cyber Terrorism Using Trace Pattern
Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...
متن کاملCyber Terrorism: A Clear and Present Danger to Civilized Society?
As today’s information security professionals, both in private and public organizations, work towards learning and countering the threats posed by destructive viruses and worms; Distributed Denial of Service exploits; and intrusions to disrupt vulnerable systems, there is another major threat of “cyber terrorism” that is looming around the corner. Primarily targeted at government agencies and p...
متن کاملAssessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
Cyber attacks, network security and information pose complex problems that reach into new areas for national security and public policy. This paper looks at one set of issues – those related to cyber-terrorism and cyber attacks on critical infrastructure and their implications for national security. Cyber-terrorism is “the use of computer network tools to shut down critical national infrastruct...
متن کاملHow Can We Deter Cyber Terrorism?
Jian Hua1 and Sanjay Bapna2 1School of Business and Public Administration, University of the District of Columbia, Washington, D.C., USA 2Morgan State University, Baltimore, Maryland, USA ABSTRACT In order to deter cyber terrorism, it is important to identify the terrorists, since punishment may not deter them. The identification probability relies heavily on tracking cyber terrorists. However,...
متن کاملAdoption of ISMS for Protecting SCADA Systems against Cyber Terrorism Threats
The potential for catastrophic cyber attacks that can cripple the operations of critical infrastructures of nations is worrying. The consequences of cyber attack to the Supervisory Control and Data Acquisition (SCADA) systems are wide, resulting in potentially catastrophic damages and disruption. This paper proposes for the Critical National Information Infrastructure (CNII) organizations to co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013