Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  
Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Responses to Cyber Terrorism
Responses to Cyber Terrorism
Date: 28 April 2011, 06:17

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " Responses to Cyber Terrorism " from UseNet for FREE!
The one issue touched on repeatedly by the contributors of this publication is the difficulty of arriving at a definition of cyber terrorism. A NATO Office of Security document cautiously defines it as 'a cyber attack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal.' But the cyber world is surely remote from what is recognized as terrorism: the bloody attacks and ethnic conflicts, or, more precisely, the politically-motivated 'intention to cause death or serious bodily harm to civilians or non-combatants with the purpose of intimidating a population or compelling a government...' (UN report, 'Freedom from Fear', 2005). It is hard to think of an instance when computer code has physically harmed anyone. Yet a number of contributors show that exactly such events, potentially on a huge scale, can be expected. For example attacks on critical infrastructure, in particular on SCADA (Supervisory Control and Data Acquisition) systems which control physical processes in places like chemical factories, dams and power stations. A part of the publication examines cyber terrorism in the proper sense of the term and how to respond in terms of technology, awareness, and legal/political measures. However, there is also the related question of responding to the terrorist presence on the Internet (so-called 'terrorist contents'). Here the Internet is not a weapon, but an important tool for terrorists' communications (coordination, training, recruiting), and information gathering on the targets of planned attacks.

DISCLAIMER:

This site does not store Responses to Cyber Terrorism on its server. We only index and link to Responses to Cyber Terrorism provided by other sites. Please contact the content providers to delete Responses to Cyber Terrorism if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches