Cyberterrorism : The Next Arena of Confrontation

نویسنده

  • George K. Kostopoulos
چکیده

This paper presents a research conducted over the increasing dangers of cyberterrorism. It discusses the cyberterrorism parameters the cyberterrorists, the attacks, and the countermeasures – as well as the Internet’s physical security. The paper sounds an alarm over the current accessibility of critical intranets via the Internet, and points out that the risks in this practice outweigh any possible benefits. Concern is also raised over the security of Internet’s physical infrastructure, suggesting increased redundancy and that countries have more physical entry points into cyberspace. The paper concludes with two recommendations. One is the physical isolation of the Internet from critical intranets, and the other is the development of an Internet SCADA to oversee the Internet’s performance in the U.S. cyberspace. “In the case of cyber war, you really can't tell whether the enemy has good weapons until the enemy uses them.” (Clarke 1 in Kirk, 2003)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyberspace as a new arena for terroristic propaganda: an updated examination

This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists explo...

متن کامل

Ethical Aspects of Information Security and Privacy

This essay reviews ethical aspects of computer and information security and privacy. After an introduction of ethical approaches to information technology , the focus is first on ethical aspects of computer security. These include the moral importance of computer security, the relation between computer security and national security, the morality of hacking and computer crime, the nature of cyb...

متن کامل

Managing robotics in the generic pharmaceutical arena

Robotics was introduced by Danbury Pharmacal, Inc. in 1987 in order to improve laboratory throughput for several new products. The author uses Danbury Pharmacal's experience to give an overview of various issues, such as acceptance by senior management and chemists, political confrontation, validation and product throughput.

متن کامل

Logic Tester for the Classification of Cyberterrorism Attacks

The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as a real threat, this research will propose a method for classifying incidents as either cyberterrorism or cyber-attacks. Although there have been no reported ...

متن کامل

Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet

This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent ‘Use’ at one end to ‘Cyberterrorism’ at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups’ ‘use’ of the Internet, in particular the content of their websites, and their ‘misuse’ of the medium, as in hacking wars, for example. Terrorist gr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009