Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies

Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies

Ali Al Mazari, Ahmed H. Anjariny, Shakeel A. Habib, Emmanuel Nyakwende
Copyright: © 2016 |Pages: 12
DOI: 10.4018/IJCWT.2016010101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The aim of this paper is to identify common features in: the definition of cyber terrorism, cyber terrorism targets, cyber terrorism crimes and then develop effective mitigation strategies and countermeasures to tackle this phenomenon. Through rigorous analysis of literature covering academic articles and official reports, we develop cyber terrorism definition taxonomy which includes five elements: target, motive, means, effect and intention; cyber terrorism targets taxonomy identified from the following target areas: military forces, government cyber and physical infrastructures, critical national infrastructures, social and national identity, and private industry and entities. The cyber terrorism risk factors are classified into main five categories: national security, financial, social and cultural, operational disruption and physical destructions risks. The following identified patterns constituted the cyber terrorism targets taxonomy: incursion, destruction, service interruption, disinformation and web sites defacement. The authors categorized effective strategic approaches to tackle cyber terrorism as: administrative, technological, national and local alliances, international alliances, and education, training and psychological approach. They developed cyber terrorism taxonomies which represent a systematic organization and classification of knowledge that improves scientific awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies.
Article Preview
Top

Cyber-Terrorism Definition

Cyber terrorism is a new phenomenon or form of cybercrime which has its own aims, characteristics and other attributes (DCSINT, 2006). The concept of cyber terrorism has been defined differently by researchers and industry reporters. In the early eighties, cyber terrorism was seen as a combination of the physical and cyber world threats involving online computer and network interactions where users can exchange information in a real time (Samuel, Osman, Al-Khasawneh, & Duhaim, 2014). Cyber terrorism was defined as shutdown due to attacks on critical national infrastructures or intimidation of civilians or governmental employees, with the use of computer networks and technologies (Lewis, 2002). Cyber terrorism was also seen as unlawful attacks against computers, communication networks, information systems and stored information with the purpose of intimidating a government or its people in furtherance of political or social objectives. The attacks resulted in violence against individuals, groups or properties, or harm which generated fear (Denning, 2000).

Cyber terrorism was also defined as an electronic attack from cyberspace conducted using internal and external networks with different motives and directed at a particular target (Warren, 2002). This definition highlights the source of the attack which can be from inside or outside an organization. It has been reported that attacks are much more dangerous when done by insiders as internal terrorists have considerable access to the networks and systems as employees (Jalil, 2003). The US Federal Bureau of Investigation (FBI) defines cyber terrorism as a criminal act perpetrated by the use of computer systems and telecommunication networks causing violence, destruction and/or disruption of services to create fear due to confusion and uncertainty within a given group or population, with the goal of motivating a government or population to conform to a particular political, social, or ideological agenda (DCSINT, 2006). Another study considered cyber terrorism to be an activity done using information technology systems by governmental or non-governmental organizations against individuals to create intimidation with an ultimate political, religious or social goal (Macdonald, Jarvis, & Chen, 2013).

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing