Reference Hub1
Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism

Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism

Metodi Hadji-Janev
ISBN13: 9781466629646|ISBN10: 1466629649|EISBN13: 9781466629653
DOI: 10.4018/978-1-4666-2964-6.ch005
Cite Chapter Cite Chapter

MLA

Hadji-Janev, Metodi. "Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism." Critical Information Infrastructure Protection and Resilience in the ICT Sector, edited by Paul Théron and Sandro Bologna, IGI Global, 2013, pp. 93-113. https://doi.org/10.4018/978-1-4666-2964-6.ch005

APA

Hadji-Janev, M. (2013). Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism. In P. Théron & S. Bologna (Eds.), Critical Information Infrastructure Protection and Resilience in the ICT Sector (pp. 93-113). IGI Global. https://doi.org/10.4018/978-1-4666-2964-6.ch005

Chicago

Hadji-Janev, Metodi. "Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism." In Critical Information Infrastructure Protection and Resilience in the ICT Sector, edited by Paul Théron and Sandro Bologna, 93-113. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2964-6.ch005

Export Reference

Mendeley
Favorite

Abstract

The emergence of new non-state actors in the post Cold War reality has dramatically changed security environment around the globe. Modern terrorism practiced by Al Qaeda and its associated movement (AQAM) has posed serious threat to critical information infrastructure given the trend of connecting control systems that run these infrastructures to the internet. Although AQAM have not been successful to launch a cyber-attack that will cause mass casualties, environment damage, or financial effects, the possibility remains alarming since creativity in the age of globalization never ends. Additionally, by using the so called “dot-com culture,” modern terrorists effectively employ negative effects of globalization to rich to the societies’ remote pockets and Islamic social nomads and thus enlarge their capabilities to affect our critical information infrastructure. Therefore, to effectively protect our CII from modern terrorists we need to consider comprehensive and holistic approach build on direct and indirect mechanisms.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.