Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet18/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   14   15   16   17   18   19   20   21   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

13
 
Cyber terrorism definition
In 2002, the US Center for Strategic and International Studies defined cyber ter-
rorism as:
The use of computer network tools to shut down critical national infrastructure 
(such as energy, transportation, government operations) or to coerce or intimi-
date a government or civilian population (
Lewis, 2002
).
This definition is imprecise. For instance, this definition suggests that a critical 
infrastructure operator who shuts down a (part of) critical infrastructure for techni-
cal or safety reasons from his/her operating station could be a cyber terrorist. At the 
same time, hacktivists trying to impress governmental decision-makers are cyber 
terrorists as well—and are not included.
When reflecting on press headlines from the last 25 years, it immediately becomes 
apparent that each new disruption related to our cyber world is labeled by popular 
press as “cyber terror.” Then with hindsight, the “cyber terror” event is hardly remem-
bered a couple of years later. At most it is regarded as a simple act of cybercrime or 
activism. In instances where it was a denial-of-service attack, the sustained bandwidth 
of daily annoying attacks to organizations is often factored higher than the simple 
cyber surface scratching event which was labeled as a cyber-terror event in the press.
Another source of confusion stems from the use of the term “cyber terror” for all 
use of cyberspace activities by terrorists and terrorist groups. It is the combination of 
cyberspace as a possible target and a weapon used by terrorists and terrorist groups of 
the communication commodity services we all use. Terrorists use cyberspace for their 
command and control, global information exchange and planning, fundraising and at-
tempts to increase their support, community, propaganda, recruitment, and information 
operations (
Bosch et al., 1999
) to influence the public opinion (
NCTb, 2009
). Some 
of this use may be considered crime or even cybercrime by national governments, but 
it will not be considered “terrorism” according to the various national legal systems.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   14   15   16   17   18   19   20   21   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish