Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today

Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today

Flavia Zappa Leccisotti, Raoul Chiesa, Niccolo De Scalzi, Leopoldo Gudas, Daniele De Nicolo
ISBN13: 9781466687936|ISBN10: 1466687932|EISBN13: 9781466687943
DOI: 10.4018/978-1-4666-8793-6.ch005
Cite Chapter Cite Chapter

MLA

Leccisotti, Flavia Zappa, et al. "Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today." Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, edited by Metodi Hadji-Janev and Mitko Bogdanoski, IGI Global, 2016, pp. 102-126. https://doi.org/10.4018/978-1-4666-8793-6.ch005

APA

Leccisotti, F. Z., Chiesa, R., De Scalzi, N., Gudas, L., & De Nicolo, D. (2016). Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today. In M. Hadji-Janev & M. Bogdanoski (Eds.), Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (pp. 102-126). IGI Global. https://doi.org/10.4018/978-1-4666-8793-6.ch005

Chicago

Leccisotti, Flavia Zappa, et al. "Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today." In Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, edited by Metodi Hadji-Janev and Mitko Bogdanoski, 102-126. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8793-6.ch005

Export Reference

Mendeley
Favorite

Abstract

The ICT technology is even more central in modern society. Every relevant sectors of Western economies depend on ICT technology, from Energy Infrastructure to banking and finance, from TLC infrastructure to government administration. Throughout history, terrorist organizations have demonstrated capacity to adapt and evolve in order to further their ideological and political goals. Cyber Terrorism is increasingly becoming a top five national security priority for Nation States. The purpose of this chapter is to evaluate the threat Cyber Terrorism poses to the stability of the international community. It will explore the concept of Cyber Terrorism, its interpretations and terminology. This chapter seeks to identify potential attacks made possible through IT and ICT technologies (like SCADA and Industrial Automation, while it includes those ICT standards used in the field of Transport, Automotive, and Social Networks as well) and to classify all the possible actors, needed skills and relevant goals, thanks to the currently available public documentation and relevant case studies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.