Cyberterrorism : The Next Arena of Confrontation
نویسنده
چکیده
This paper presents a research conducted over the increasing dangers of cyberterrorism. It discusses the cyberterrorism parameters the cyberterrorists, the attacks, and the countermeasures – as well as the Internet’s physical security. The paper sounds an alarm over the current accessibility of critical intranets via the Internet, and points out that the risks in this practice outweigh any possible benefits. Concern is also raised over the security of Internet’s physical infrastructure, suggesting increased redundancy and that countries have more physical entry points into cyberspace. The paper concludes with two recommendations. One is the physical isolation of the Internet from critical intranets, and the other is the development of an Internet SCADA to oversee the Internet’s performance in the U.S. cyberspace. “In the case of cyber war, you really can't tell whether the enemy has good weapons until the enemy uses them.” (Clarke 1 in Kirk, 2003)
منابع مشابه
Cyberspace as a new arena for terroristic propaganda: an updated examination
This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists explo...
متن کاملEthical Aspects of Information Security and Privacy
This essay reviews ethical aspects of computer and information security and privacy. After an introduction of ethical approaches to information technology , the focus is first on ethical aspects of computer security. These include the moral importance of computer security, the relation between computer security and national security, the morality of hacking and computer crime, the nature of cyb...
متن کاملManaging robotics in the generic pharmaceutical arena
Robotics was introduced by Danbury Pharmacal, Inc. in 1987 in order to improve laboratory throughput for several new products. The author uses Danbury Pharmacal's experience to give an overview of various issues, such as acceptance by senior management and chemists, political confrontation, validation and product throughput.
متن کاملLogic Tester for the Classification of Cyberterrorism Attacks
The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as a real threat, this research will propose a method for classifying incidents as either cyberterrorism or cyber-attacks. Although there have been no reported ...
متن کاملReality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent ‘Use’ at one end to ‘Cyberterrorism’ at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups’ ‘use’ of the Internet, in particular the content of their websites, and their ‘misuse’ of the medium, as in hacking wars, for example. Terrorist gr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009