TERRORIST USE OF CYBER TECHNOLOGY

نویسندگان

چکیده

The risk posed by terrorist use of cyber technology and terrorism have been great concern to politicians, decision makers, security officials. This article studies along with history cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare hactivism will be analysed. Furthermore, the challenges faced international organisations in tackling discussed; measures introduced countries address treats are presented well discussions on present future treat technology.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

C . Modeling Behavior of the Cyber - Terrorist

The Cyber-Terrorist is assumed to be a very real threat to modern information systems, especially those trusted to control the nation’s defenses and critical infrastructure. Very little intelligence or solid data exist regarding this adversary. This discussion chronicles the efforts by a team at the Defense Advanced Research Projects Agency to model and characterize this adversary. The ultimate...

متن کامل

Modern Quantum Technologies of Information Security against Cyber-terrorist Attacks

In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current s...

متن کامل

Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity

The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate methods to improve the ability to detect, identify and deter Cyber Terrorist attack. It also proposes ways to implement responsible, accountable and identifiable use of the Internet, and deny anonymity to the attackers.

متن کامل

Technology Adoption and Use Theory Review for Studying Scientists’ Continued Use of Cyber-infrastructure

In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyberinfrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. W...

متن کامل

Cyber Medical Education: Beyond the Integration of Concepts in Technology-based Learning

Introduction: Along with the transition from the digital era to the era of cyber-technology, medical professionals have been forced to use different conceptual systems to meet their informational and communicational needs. These emerging scientific concepts each have specific meaning which should be redefined in their own context so that they could be utilized in the conceptual systems of speci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Eskis?ehir teknik u?niversitesi bilim ve teknoloji dergisi b- teorik bilimler

سال: 2021

ISSN: ['2667-419X']

DOI: https://doi.org/10.20290/estubtdb.1021324