Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet171/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   167   168   169   170   171   172   173   174   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

166
CHAPTER 13
Cyber terrorism: Case studies
This chapter assesses whether attacks in cyberspace by terrorist organizations, 
whose effect until now has usually been tactical, will be able to upgrade (or perhaps 
have already upgraded) their ability to operate cyber weapons with strategic sig-
nificance—weapons that can inflict large scale or lasting damage of the sort causing 
critical systems to collapse and “brings countries to their knees.”
This chapter focuses on the activities of non-state organizations with political 
agendas and goals, even if operated or supported by states. A distinction is drawn 
between these activities and those conducted directly by countries, which are beyond 
the scope of this chapter, as are the activities of organizations whose aims are mainly 
of a criminal nature. For the purpose of this chapter, a terrorist act from a non-state 
organization in cyberspace will be defined as an act in cyberspace designed to de-
liberately or indiscriminately harm civilians (see Chapter 2 for other definitions of 
cyber terrorism).
In order to assess the activities of terrorist organizations in cyberspace, the first 
stage is the identification of motives for using cyberspace as part of the political 
struggle being waged by the terrorist organizations. Two principal motives were 
identified. The first is the use of cyberspace supporting terrorist activity, mainly the 
acquisition of money and recruits or money laundering in order to finance the activ-
ity. The second is the use of tools in cyberspace providing the actual strike against the 
targets terrorist organizations set for themselves, as well as its use for other violent 
means. In this context we will analyze the cooperation between non-state organiza-
tions and the states operating them supporting their terrorist activity.
The second stage of this study required an examination of terrorist operations in 
cyberspace, that is, operations whose purpose is to cause deliberate or indiscriminate 
harm to civilians through action in cyberspace by non-state organizations with politi-
cal agendas and goals, even if operated or supported by states.
The third stage is an assessment and understanding of the capabilities terrorist 
organizations can obtain, and by them to generate an effective and significant terror-
ist attack.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   167   168   169   170   171   172   173   174   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish