Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
نویسندگان
چکیده
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate methods to improve the ability to detect, identify and deter Cyber Terrorist attack. It also proposes ways to implement responsible, accountable and identifiable use of the Internet, and deny anonymity to the attackers.
منابع مشابه
Defending Cyber Terrorism - A Game Theoretic Modeling Approach
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...
متن کاملPreventing Terrorism by Combating Financial Resources
Terrorism is an offensive action which violates human rights and always invades to people’s rights. Given the high incidence of this type of global action and the widespread violations of human rights and peace and security, countering terrorism will be important. The existence of financial resources is an essential element of terrorism and Preemptive measures and their success in blocking fina...
متن کاملDiscovering Cyber Terrorism Using Trace Pattern
Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...
متن کاملCyber-Terrorism and Ethical Journalism: A Need for Rationalism
Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases tha...
متن کاملCyber Terrorism: A Clear and Present Danger to Civilized Society?
As today’s information security professionals, both in private and public organizations, work towards learning and countering the threats posed by destructive viruses and worms; Distributed Denial of Service exploits; and intrusions to disrupt vulnerable systems, there is another major threat of “cyber terrorism” that is looming around the corner. Primarily targeted at government agencies and p...
متن کامل