Logic Tester for the Classification of Cyberterrorism Attacks
نویسندگان
چکیده
The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as a real threat, this research will propose a method for classifying incidents as either cyberterrorism or cyber-attacks. Although there have been no reported cases of Information Communication Technologies causing life-threatening situations or death, this research aims to show that cyberterrorism is not a negligible threat but instead a dangerous risk that should not be overlooked. This research will investigate the merging of terrorism with the cyber domain and present a multilayered definition for cyberterrorism. This proposed definition is founded on the definition for traditional terrorism and incorporates elements of the international understanding of cyberterrorism. The research future presents a Logic Tester that uses Boolean logic to test the application of the multi-layered definition for cyberterrorism in terms of past international cyber incidents. The merit of the Logic Tester is presented through its application on a number of potential cyberterrorism scenarios, using the definition to classify these as either cyberterrorism or cyberattacks.
منابع مشابه
Status and Requirements of Counter-Cyberterrorism
The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect comp...
متن کاملToward Cognitive Immunization of Potential Criminals against Cyberterrorism
Most research into preventing cyberterrorism, whether by foreign or domestic individuals, has focused on technical measures to detect or prevent the attacks. Such efforts presume that individuals are already radicalized and that events are inevitable. Our investigations look further back; we seek to understand and influence the events which occur long before the cyberterrorism attacks are formu...
متن کاملChapter 2 Terrorism and the Internet : New Threats Posed by Cyberterrorism and Terrorist Use of the Internet
Although it is known that terrorists already routinely use the Internet for purposes such as spreading propaganda or conducting internal communication, the threat that results from this use is heavily debated. Especially the question whether a cyber terrorist attack is imminent or if it is only a purely fictitious scenario is subject to many discussions. One reason for these differences in opin...
متن کاملImproving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed ...
متن کاملCyberterrorism: The Sum of All Fears?
Cyberterrorism conjures up images of vicious terrorists unleashing catastrophic attacks against computer networks, wreaking havoc, and paralyzing nations. This is a frightening scenario, but how likely is it to occur? Could terrorists cripple critical military, financial, and service computer systems? This article charts the rise of cyberangst and examines the evidence cited by those who predic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCWT
دوره 5 شماره
صفحات -
تاریخ انتشار 2015