Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate
نویسنده
چکیده
For some years, experts and government officials have warned of cyber-terrorism as a looming threat to national security. However, if we define cyber-terror as an attack or series of attacks that is carried out by terrorists, that instills fear by effects that are destructive or disruptive, and that has a political, religious, or ideological motivation, then none of the disruptive cyber-incidents of the last years qualify as examples of cyber-terrorism. So why has this fear been so persistent? Instead of trying to answer how long cyber-terror is likely to remain a fictional scenario, this paper analyzes the US cyber-terror discourse from a constructivist security studies angle: It looks at how cyber-threats in general, and cyber-terror in particular are framed, and speculates on characteristics that are responsible for the rapid and considerable political impact of the widespread conceptualization of aspects of information technology as a security problem in the 1990s. doi:10.1300/J516v04n01_03 [Article copies available for a fee from The Haworth Document Delivery Service: 1-800-HAWORTH. E-mail address: Website: © 2007 by The Haworth Press. All rights reserved.]
منابع مشابه
A survey of Cyber Attack Detection Strategies
Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...
متن کاملTraining organizational supervisors to detect and prevent cyber insider threats: two approaches
Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instru...
متن کاملThreat Visibility for Cyber Hunters
Multiple branches of the United States military, spearheaded by United States Cyber Command, have embraced threat hunting as a way to defend against more sophisticated adversaries. This white paper explains how Cyber Protection Teams (CPTs) can use wire data to automate detection, speed investigations, and improve the granularity and collection of information. The paper includes examples of thr...
متن کاملCyber Terrorism: A Clear and Present Danger to Civilized Society?
As today’s information security professionals, both in private and public organizations, work towards learning and countering the threats posed by destructive viruses and worms; Distributed Denial of Service exploits; and intrusions to disrupt vulnerable systems, there is another major threat of “cyber terrorism” that is looming around the corner. Primarily targeted at government agencies and p...
متن کاملA Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intellige...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007