Logic Tester for the Classification of Cyberterrorism Attacks

نویسندگان

  • Namosha Veerasamy
  • Marthie Grobler
چکیده

The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as a real threat, this research will propose a method for classifying incidents as either cyberterrorism or cyber-attacks. Although there have been no reported cases of Information Communication Technologies causing life-threatening situations or death, this research aims to show that cyberterrorism is not a negligible threat but instead a dangerous risk that should not be overlooked. This research will investigate the merging of terrorism with the cyber domain and present a multilayered definition for cyberterrorism. This proposed definition is founded on the definition for traditional terrorism and incorporates elements of the international understanding of cyberterrorism. The research future presents a Logic Tester that uses Boolean logic to test the application of the multi-layered definition for cyberterrorism in terms of past international cyber incidents. The merit of the Logic Tester is presented through its application on a number of potential cyberterrorism scenarios, using the definition to classify these as either cyberterrorism or cyberattacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Status and Requirements of Counter-Cyberterrorism

The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect comp...

متن کامل

Toward Cognitive Immunization of Potential Criminals against Cyberterrorism

Most research into preventing cyberterrorism, whether by foreign or domestic individuals, has focused on technical measures to detect or prevent the attacks. Such efforts presume that individuals are already radicalized and that events are inevitable. Our investigations look further back; we seek to understand and influence the events which occur long before the cyberterrorism attacks are formu...

متن کامل

Chapter 2 Terrorism and the Internet : New Threats Posed by Cyberterrorism and Terrorist Use of the Internet

Although it is known that terrorists already routinely use the Internet for purposes such as spreading propaganda or conducting internal communication, the threat that results from this use is heavily debated. Especially the question whether a cyber terrorist attack is imminent or if it is only a purely fictitious scenario is subject to many discussions. One reason for these differences in opin...

متن کامل

Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed ...

متن کامل

Cyberterrorism: The Sum of All Fears?

Cyberterrorism conjures up images of vicious terrorists unleashing catastrophic attacks against computer networks, wreaking havoc, and paralyzing nations. This is a frightening scenario, but how likely is it to occur? Could terrorists cripple critical military, financial, and service computer systems? This article charts the rise of cyberangst and examines the evidence cited by those who predic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCWT

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2015