You are here: Home Contents V18 N3 V18N3_Rabie.html
Personal tools

Cyber Terrorism: A Critical Assessment of the Threat Landscape and Countermeasures

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 18, Number 3 (2022)
Pages 155165
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Osama Rabie — FCIT, King Abdulaziz University, Jeddah, Kingdom of Saudi Arabia
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

This paper examines the impact of the internet on dissemination of harmful content, with a specific focus on the issue of cyberterrorism. We define the term cyber "terrorist" within the context of violent followers of a particular ideology and emphasizes the importance of understanding the difference between legitimate self-defense and violent extremist actions to effectively combat cyberterrorism. To address this growing threat, the paper discusses various measures taken by governments to counter cyberterrorism, including investing in research, securing critical infrastructure, enacting laws to criminalize cybercrime, and taking proactive measures to disrupt terrorist activity online. The paper also highlights the need for a multidisciplinary approach involving education, technology, and public awareness to combat this threat.

 

 

Keywords

Cyberterrorism, Cybersecurity, Countermeasures, Threats, Vulnerabilities.

 

 

References

Crosbie, M. and Spafford, E. H. "Defending a Computer System Using Autonomous Agents" (1995). Department of Computer Science Technical Reports. Paper 1200. https://docs.lib.purdue.edu/cstech/1200

Dhillon, G., Oliveira, T., Susarapu, S., and Caldeira, M. (2016). Deciding between information security and usability: Developing value-based objectives. Computers in Human Behavior, 61, 656-666.

Dhillon, S. (2021). Zoombombing: hype and reality. Journal of Information System Security, 17(3).

Dhillon, S. and Nunes, S. (2020). Interpreting individual values for information privacy and security. Journal of Information System Security, 16(3).

Forrest, S., Somayaji, A., and Ackley, D. H. (1997). Building diverse computer systems. In Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133) (pp. 67-72). IEEE.

Fovino, I. N., Guidi, L., Masera, M., and Stefanini, A. (2011). Cyber security assessment of a power plant. Electric Power Systems Research, 81(2), 518-526.

Hansen, J. V., Lowry, P. B., Meservy, R. D., and McDonald, D. M. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362-1374.

Lee, S., Huh, JH. (2019). An effective security measures for nuclear power plant using big data analysis approach. The Journal of Supercomputing, 75(8), 4267–4294.

Papadimitriou, F. (2009). A nexus of Cyber-Geography and Cyber-Psychology: Topos/“Notopia” and identity in hacking. Computers in Human Behavior, 25(6), 1331-1334.

Smith, K. and Dhillon, G. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research, 33(1), 84-123.

Wynn, E. and Katz, J. (1997). Hyperbole over cyberspace: Self-presentation and social boundaries in Internet home pages and discourse. The Information Society, 13(4), 297-327.