Status and Requirements of Counter-Cyberterrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Status and Requirements of Counter-Cyberterrorism

Authors: Jeong-Tae Kim, Tchanghee Hyun

Abstract:

The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect computers on network remain largely unknown. The growing trend toward the use of more automated and menacing attack tools has also overwhelmed some of the current methodologies used for tracking cyber attacks. There is an ample possibility that this kind of cyber attacks can be transform to cyberterrorism caused by illegal purposes. Cyberterrorism is a matter of vital importance to national welfare. Therefore, each countries and organizations have to take a proper measure to meet the situation and consider effective legislation about cyberterrorism.

Keywords: Cyberterrorism, cyber attack, information security, legislation

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1077793

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2734

References:


[1] Borchgrave, A., William H.W. "Cybercrime, Cyberterrorism, Cyber warfare", CSIS Publications, 1998
[2] Cameron, J., Vaile, D. "The War on Terrorism Vs. Cyber Liberties", IFIP WG, 2003
[3] Cordesman, A.H. "Cyber-Threats, Information Warfare, and Critical Infrastructure Protection", CSIS, 2002
[4] Denning, D.E. "Cyberterrorism", Global Dialogue, 2000
[5] Department of Defense, Office of General Counsel, "An Assessment of International Legal Issues in Information Operations", 1991
[6] Garrison, L and Grand, M. "Cyberterrorism: An evolving concept", NIPC Highlights, 2001
[7] Goodin, D. (1997) "Taking Aim at Cyberterrorism," Available: http://news.com.com/2100-1023-204515.html
[8] Grossman, M. (1999) "Cyberterrorism", Available: http://www.mgrossmanlaw.com/articles /1999/cyberterrorism.htm
[9] Jalil, S.A. "Countering Cyberterrorism Effectively: Are We Ready To Rumble?", SANS Institute, 2003
[10] Kim, J. T., Park, S. Y. and Hyun, T. (2005) "An Inquiry into International Countermeasures against Cyberterrorism", ICACT 2005
[11] Mitliaga, V. (2001) "Cyber-Terrorism: A Call for Governmental Action?", Available: http://www.bileta.ac.uk/01papers/mitliaga.html
[12] Nagpal, R. "Cyberterrorism in the Context of Globalization," National Seminar on "Globalization and Human Rights", 2002
[13] Pollitt, M.M. (2003) "Cyberterrorism - Fact or Fancy?", FBI Laboratory, Available: http://www.cs.georgetown.edu/~denning/infosec/pollitt.html