Responses to Cyber Terrorism
Centre of Excellence Defence Against Terrorism
IOS Press, 2008 - Political Science - 145 pages
The one issue touched on repeatedly by the contributors of this publication is the difficulty of arriving at a definition of cyber terrorism. A NATO Office of Security document cautiously defines it as ""a cyber attack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal."" But the cyber world is surely remote from what is recognized as terrorism: the bloody attacks and ethnic conflicts, or, more precisely, the politically-motivated ""intention to cause death or serious bodily h.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Interwoven Domain of Enabling Technologies and Cultural Interaction
Institutionalization of a WebFocused Multinational CounterTerrorism Campaign Building a Collective Open Source Intelligent System
Critical Information Infrastructure Protection
Use of the Internet by Terrorists
The Reliance of alQaeda on the Internet
General Overview of the Available Mechanisms to Facilitate an Overwhelming Task
International Coordination of Prosecution and Prevention of Cyber Terrorism
Other editions - View all
activities agencies al Qaeda al-Qaeda Alneda analysis Ankara audience bomb bot-nets campaign communication computer systems Convention Convention on Cybercrime Council of Europe counter-terrorism countries criminal critical infrastructure cyber attacks Cyber Crime cyber security cyberspace cyberterrorism Defence Against Terrorism Defense e-mail electronic Estonia European Europol example forums global jihad governmental hackers hacking identify important information systems information technology Infrastructure Protection institutions international cooperation Internet Iraq Islamist Islamist terrorism issues jihad jihad movement jihadist Kurdish last visited launched law enforcement mass media monitoring mujahideen Muslim NATO open source Open Source Intelligence operations participants PKK/KONGRA-GEL website possible potential private sector propaganda Qaeda recruits Responses to Cyber Retrieved March SCADA SCADA systems September 2007 servers strategy targets telecommunications terrorist content terrorist groups terrorist organizations terrorist websites threat Turkish users vulnerabilities