Cyber Terrorism: Political and Economic ImplicationsCyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, Cyber Terrorism: Political and Economic Implications puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives. |
Contents
Chapter II | 14 |
Chapter III | 33 |
Final Thoughts of This Chapter | 52 |
Copyright | |
5 other sections not shown
Other editions - View all
Common terms and phrases
activities additional al Qaeda and/or application authentication author's opinion browser cable capabilities Chapter communication computer crime Conference connection continue coordination Copying or distributing Copyright 2006 crackers create cyber criminals cyber terrorism cyber terrorist cyberspace devices disrupt distributing in print e-mail economic efforts electronic forms encryption exploit facilitate files firewall forms without written global information infrastructure hackers hacktivism hijacked host Idea Group Inc IEEE individuals initiatives intelligence International Internet Internet protocol intruder Islamic issues military monitoring Muslim National network structure occur operations packets password penetration policies Political Violence potential print or electronic protocol Qaeda result Retrieved routers satellite SCADA September 11th attacks server share skills society targets technologies telecommunications Terrorism and Political Terrorist Attacks terrorist groups terrorist organizations threat tion transfer transmission user's utilized virus vulnerabilities Wall Street Journal wireless