TERRORIST USE OF CYBER TECHNOLOGY
نویسندگان
چکیده
The risk posed by terrorist use of cyber technology and terrorism have been great concern to politicians, decision makers, security officials. This article studies along with history cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare hactivism will be analysed. Furthermore, the challenges faced international organisations in tackling discussed; measures introduced countries address treats are presented well discussions on present future treat technology.
منابع مشابه
C . Modeling Behavior of the Cyber - Terrorist
The Cyber-Terrorist is assumed to be a very real threat to modern information systems, especially those trusted to control the nation’s defenses and critical infrastructure. Very little intelligence or solid data exist regarding this adversary. This discussion chronicles the efforts by a team at the Defense Advanced Research Projects Agency to model and characterize this adversary. The ultimate...
متن کاملModern Quantum Technologies of Information Security against Cyber-terrorist Attacks
In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current s...
متن کاملCombating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate methods to improve the ability to detect, identify and deter Cyber Terrorist attack. It also proposes ways to implement responsible, accountable and identifiable use of the Internet, and deny anonymity to the attackers.
متن کاملTechnology Adoption and Use Theory Review for Studying Scientists’ Continued Use of Cyber-infrastructure
In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyberinfrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. W...
متن کاملCyber Medical Education: Beyond the Integration of Concepts in Technology-based Learning
Introduction: Along with the transition from the digital era to the era of cyber-technology, medical professionals have been forced to use different conceptual systems to meet their informational and communicational needs. These emerging scientific concepts each have specific meaning which should be redefined in their own context so that they could be utilized in the conceptual systems of speci...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Eskis?ehir teknik u?niversitesi bilim ve teknoloji dergisi b- teorik bilimler
سال: 2021
ISSN: ['2667-419X']
DOI: https://doi.org/10.20290/estubtdb.1021324