DSpace
 

Researchspace >
General science, engineering & technology >
General science, engineering & technology >
General science, engineering & technology >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10204/3335

Title: Towards a Conceptual Framework for Cyber-terrorism
Authors: Veerasamy, N
Keywords: Cyber-terrorism
Cyber-crime
Warfare
Hacking
Information warfare
Terrorism
Cyber-space
Cyber-warfare
Issue Date: Mar-2009
Publisher: 4th International Conference on Information Warfare and Security
Citation: Veerasamy, N. 2009. Towards a Conceptual Framework for Cyber-terrorism. 4th International Conference on Information Warfare and Security. Cape Town, South Africa; 26-27 March 2009, pp 10
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyber-terrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives are no longer the only means to bring a system down, many are uneasy about random cyber attacks that could leave us with difficult conditions due to the disruption of critical services. As a result of our increased dependency on networked communications, the outcomes of such interruptions could be quite disastrous. Cyber-terrorism is an aspect of cybercrime that has thus become a growing interest in this the Digital Age. Various hacking and computer intrusion scenarios could possibly play a critical role in cyber-terrorism. In the global battle of information and network warfare, cyber-terrorism has become a more dominant force. However, much misconception exists over what exactly cyber-terrorism entails. Media has sensationalised the possibility of cyber-terrorism attacks causing great havoc. Images of eccentric activists taking down critical infrastructures like power stations or railway lines bombard us. Many live in fear of the possibility of vital resources being taken down
Description: Copyright: 2009 This is the author's version of the work. Not for redistribution, for profit or commercial advantage
URI: http://hdl.handle.net/10204/3335
ISBN: 978-906638-00-9
Appears in Collections:Command control and information warfare
Information security
General science, engineering & technology

Files in This Item:

File Description SizeFormat
Veerasamy_2009.pdf107.72 kBAdobe PDFView/Open
View Statistics

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback