TITLE

Cyber-terror could be a new and unwelcome feature of 2007, according to experts

PUB. DATE
January 2007
SOURCE
SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p8
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article considers the possible prevalence of cyber-terrorism in 2007. In late December 2006, the U.S. government issued a warning to private financial institutions that Al Qaeda was planning to ruin their databases. The idea of terrorists using the Internet as a medium for attacks is not new, but the growing business-critical nature of Internet protocol-based systems lends the idea more weight. According to analysts, conventional attacks being organized in parallel with the cyber-attack of emergency voice over Internet protocol phone lines is possible.
ACCESSION #
23715436

 

Related Articles

  • "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE. Brenner, Susan W. // Journal of Criminal Law & Criminology;Winter2007, Vol. 97 Issue 2, p379 

    This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of responding to those threats. First, it divides the process--attribution--into two categories: what-attribution (what...

  • Cyberterrorism: The Logic Bomb versus the Truck Bomb. DENNING, DOROTHY E. // Global Dialogue;2000, Vol. 2 Issue 4, p1 

    In this article the author talks about the threat of cyberterrorism in the U.S. It refers to a combination of terrorism and cyberspace under which unlawful acts are carried out against government networks and the information stored within. She believes that cyberterrorists have declared a war...

  • DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR PROFILE. Karthika, S.; Kiruthiga, A.; Bose, S. // International Journal of Network Security & Its Applications;Jul2012, Vol. 4 Issue 4, p93 

    In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more...

  • Heavy-tailed distribution of cyber-risks. Maillart, T.; Sornette, D. // European Physical Journal B -- Condensed Matter;Jun2010, Vol. 75 Issue 3, p357 

    With the development of the Internet, new kinds of massive epidemics, distributed attacks, virtual conflicts and criminality have emerged. We present a study of some striking statistical properties of cyber-risks that quantify the distribution and time evolution of information risks on the...

  • Cyber Terror: Missing in Action. Lewis, James // Knowledge, Technology & Policy;Summer2003, Vol. 16 Issue 2, p34 

    Discusses the limited utility of the concepts of "cyber terrorism" or "electronic Pearl Harbor". Contrasts between the absence of cyber terror incidents and number of terrorist attacks and computer security incidents; Low appeal of cyber weapons to terrorists; Suggested approach to data...

  • HIGH-TECH TERROR. Misra, Sunil // American City & County;Jun2003, Vol. 118 Issue 6, pHS6 

    Focuses on cyber-terrorism. Examples of cyber-terrorism; Percentage of U.S. cities which have developed strategies to address the issue; Importance of having a computer security policy.

  • End the phony cyber war. Rid, Thomas // New Scientist;9/7/2013, Vol. 219 Issue 2933, p26 

    In this article the author discusses why cyberwar has never happened and probably never will. He argues that in order for cyberwar to happen, it would have to be violent, instrumental, and political and discusses why none of the world's previous cyberattacks meet the criteria, the risk of...

  • The cyber threat: Fear, uncertainty and doubt? Richards, Julian // Crisis Response Journal;2011, Vol. 7 Issue 4, p42 

    The article focuses on the conceptualisation of cyber threat from a security perspective. According to Jonathan Shaw, head of the Defence Cyber Operations Group (DCOG) of the British Ministry of Defence, cyberspace must be considered as the fourth dimension in defence strategy. The effect of...

  • Threat Research Unlocks the Secrets of Cyber Hazards. GIANDOMENICO, ANTHONY // Signal;Oct2015, Vol. 70 Issue 2, p46 

    The article offers information on issues facing business enterprises and government organizations in terms of protecting themselves from cyber crime. It discusses the concept of kill chain, which is being used by security professionals to describe a targeted cyber attack comprising of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics