How Can We Deter Cyber Terrorism?
نویسندگان
چکیده
Jian Hua1 and Sanjay Bapna2 1School of Business and Public Administration, University of the District of Columbia, Washington, D.C., USA 2Morgan State University, Baltimore, Maryland, USA ABSTRACT In order to deter cyber terrorism, it is important to identify the terrorists, since punishment may not deter them. The identification probability relies heavily on tracking cyber terrorists. However, there are legal and technical challenges to tracking terrorists. This paper proposes suggestions and insights on overcoming these challenges. Three types of infrastructures must be present in order to deter cyber terrorism: technical, policy, and legal. We list some of the key items that academics as well as practitioners need to focus on to improve cyber-terrorism deterrence.
منابع مشابه
Defending Cyber Terrorism - A Game Theoretic Modeling Approach
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...
متن کاملCombating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate methods to improve the ability to detect, identify and deter Cyber Terrorist attack. It also proposes ways to implement responsible, accountable and identifiable use of the Internet, and deny anonymity to the attackers.
متن کاملDiscovering Cyber Terrorism Using Trace Pattern
Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...
متن کاملUS Foreign Policy Challenges of Non-State Actors' Cyber Terrorism against Critical Infrastructure
What is cyber terrorism? The paper will examine how the fundamentalist interpretation of the Quran may affect the non-state actors’ terrorist approach to the cyber domain, the dangers of an assault and the possible side-effects in politics, international relations and the public domain. The author will approach the issue in political, legal and social terms, touching only slightly on issues suc...
متن کاملCyber Terrorism: A Clear and Present Danger to Civilized Society?
As today’s information security professionals, both in private and public organizations, work towards learning and countering the threats posed by destructive viruses and worms; Distributed Denial of Service exploits; and intrusions to disrupt vulnerable systems, there is another major threat of “cyber terrorism” that is looming around the corner. Primarily targeted at government agencies and p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Security Journal: A Global Perspective
دوره 21 شماره
صفحات -
تاریخ انتشار 2012