Cyber Terrorism: A Critical Assessment of the Threat Landscape and Countermeasures
Full text | |||
Source | Journal of Information Systems Security Volume 18, Number 3 (2022)
Pages 155–165
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Osama Rabie — FCIT, King Abdulaziz University, Jeddah, Kingdom of Saudi Arabia | ||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
This paper examines the impact of the internet on dissemination of harmful content, with a specific focus on the issue of cyberterrorism. We define the term cyber "terrorist" within the context of violent followers of a particular ideology and emphasizes the importance of understanding the difference between legitimate self-defense and violent extremist actions to effectively combat cyberterrorism. To address this growing threat, the paper discusses various measures taken by governments to counter cyberterrorism, including investing in research, securing critical infrastructure, enacting laws to criminalize cybercrime, and taking proactive measures to disrupt terrorist activity online. The paper also highlights the need for a multidisciplinary approach involving education, technology, and public awareness to combat this threat.
Keywords
Cyberterrorism, Cybersecurity, Countermeasures, Threats, Vulnerabilities.
References
Crosbie, M. and Spafford, E. H. "Defending a Computer System Using Autonomous Agents" (1995). Department of Computer Science Technical Reports. Paper 1200. https://docs.lib.purdue.edu/cstech/1200
Dhillon, G., Oliveira, T., Susarapu, S., and Caldeira, M. (2016). Deciding between information security and usability: Developing value-based objectives. Computers in Human Behavior, 61, 656-666.
Dhillon, S. (2021). Zoombombing: hype and reality. Journal of Information System Security, 17(3).
Dhillon, S. and Nunes, S. (2020). Interpreting individual values for information privacy and security. Journal of Information System Security, 16(3).
Forrest, S., Somayaji, A., and Ackley, D. H. (1997). Building diverse computer systems. In Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133) (pp. 67-72). IEEE.
Fovino, I. N., Guidi, L., Masera, M., and Stefanini, A. (2011). Cyber security assessment of a power plant. Electric Power Systems Research, 81(2), 518-526.
Hansen, J. V., Lowry, P. B., Meservy, R. D., and McDonald, D. M. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362-1374.
Lee, S., Huh, JH. (2019). An effective security measures for nuclear power plant using big data analysis approach. The Journal of Supercomputing, 75(8), 4267–4294.
Papadimitriou, F. (2009). A nexus of Cyber-Geography and Cyber-Psychology: Topos/“Notopia” and identity in hacking. Computers in Human Behavior, 25(6), 1331-1334.
Smith, K. and Dhillon, G. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research, 33(1), 84-123.
Wynn, E. and Katz, J. (1997). Hyperbole over cyberspace: Self-presentation and social boundaries in Internet home pages and discourse. The Information Society, 13(4), 297-327.