Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears
نویسندگان
چکیده
It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on civilians, corporations or the governments physically thousands of miles away and accomplish severe death polls than the traditional one. The government in the public sector or the private critical infrastructure administrators should not underestimate these potential cyber attacks. In this paper, we presented the cyber terrorism, the next generation of terrorism, to be a forthcoming and unavoidable threat to the global community as well as providing a potential rational cyber terrorist scenario, which could be the global cyber terrorism phenomena. This paper explicitly demonstrates the feasibility of launching cyber attacks toward critical infrastructures that might cause severe casualties.
منابع مشابه
A look at the formation of ISIS from the perspective of post-modern terrorism
Terrorism has been divided in several directions. One of the most important conceptual divisions of terrorism is its division into three types of traditional, modern and postmodern which, while possessing common characteristics, share their own characteristics. Traditional terrorism is the most elementary type of terrorism that is limited to the borders of a land and region; modern terrorism br...
متن کاملCyber Terrorism: A Clear and Present Danger to Civilized Society?
As today’s information security professionals, both in private and public organizations, work towards learning and countering the threats posed by destructive viruses and worms; Distributed Denial of Service exploits; and intrusions to disrupt vulnerable systems, there is another major threat of “cyber terrorism” that is looming around the corner. Primarily targeted at government agencies and p...
متن کاملPostmodern Orientalized Terrorism: Don DeLillo’s The Names
The terrorism of obscurantism is one of the hallmarks of Don DeLillo’s The Names (1982), distinguishing it as one of the "difficult writings" in his canon. Terrorism, however, is not confined to the novel’s poetics of writing, it constitutes, as the arch-motif of the novel, its politics as well. Relying on the Orientalist bulk of knowledge about the Orient, DeLillo, in this novel, inaugurates a...
متن کاملDiscovering Cyber Terrorism Using Trace Pattern
Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...
متن کاملDefending Cyber Terrorism - A Game Theoretic Modeling Approach
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. UCS
دوره 15 شماره
صفحات -
تاریخ انتشار 2009