Responses to Cyber Terrorism - NATO Science for Peace and Security Series E: Human and Societal Dynamics v. 34 (Hardback)
  • Responses to Cyber Terrorism - NATO Science for Peace and Security Series E: Human and Societal Dynamics v. 34 (Hardback)
zoom

Responses to Cyber Terrorism - NATO Science for Peace and Security Series E: Human and Societal Dynamics v. 34 (Hardback)

(editor)
£81.00
Hardback 164 Pages / Published: 01/05/2008
  • Not available

This product is currently unavailable

This product is currently unavailable.

  • This item has been added to your basket
The one issue touched on repeatedly by the contributors of this publication is the difficulty of arriving at a definition of cyber terrorism. A NATO Office of Security document cautiously defines it as "a cyber attack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal." But the cyber world is surely remote from what is recognized as terrorism: the bloody attacks and ethnic conflicts, or, more precisely, the politically-motivated "intention to cause death or serious bodily harm to civilians or non-combatants with the purpose of intimidating a population or compelling a government..." (UN report, "Freedom from Fear", 2005).It is hard to think of an instance when computer code has physically harmed anyone. Yet a number of contributors show that exactly such events, potentially on a huge scale, can be expected. For example attacks on critical infrastructure, in particular on SCADA (Supervisory Control and Data Acquisition) systems which control physical processes in places like chemical factories, dams and power stations. A part of the publication examines cyber terrorism in the proper sense of the term and how to respond in terms of technology, awareness, and legal/political measures. However, there is also the related question of responding to the terrorist presence on the Internet (so-called 'terrorist contents'). Here the Internet is not a weapon, but an important tool for terrorists' communications (coordination, training, recruiting), and information gathering on the targets of planned attacks.

Publisher: IOS Press
ISBN: 9781586038366
Number of pages: 164
Weight: 458 g
Dimensions: 239 x 160 x 15 mm

You may also be interested in...

Security in Computing
Added to basket
Black Code
Added to basket
£14.99
Paperback
The Art of Deception
Added to basket
Metasploit
Added to basket
£41.99
Paperback
File System Forensic Analysis
Added to basket
The Web Application Hacker's Handbook
Added to basket
The Mobile Application Hacker's Handbook
Added to basket
Nmap Network Scanning
Added to basket
Linux Firewalls
Added to basket
£36.99
Paperback
An Introduction to ISO/IEC 27001:2013
Added to basket
The Basics of Information Security
Added to basket
BTEC Level 3 National IT Student Book 1
Added to basket

Please sign in to write a review

Your review has been submitted successfully.