Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 1)Publication Date: 2017-01-05
Authors : Israa G. SEissa; Jamaludin Ibrahim; Nor-Zaiasron Yahaya;
Page : 180-186
Keywords : CyberTerrorism; Targeted attacks; Cyber Security; People; Process; Technology; Mitigation Strategies;
Abstract
This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies.
Other Latest Articles
- Verification of Ranked Keyword Search in Cloud Computing
- Overview of Security Mechanisms and Attacks in Wireless Sensor Networks
- Analyses of Quantum Chemical Parameters, Fukui Functions, Magnetic Susceptibility, Hyperpolarizability, Frontier Molecular Orbitals, NBO, Vibrational and NMR Studies of 1(4-Aminophenyl) Ethanone
- Assessment of Medical Staff Perspective toward Organizational Culture Safety at Primary Health Care -Almadina Almonwarra, Saudi Arabia
- Hypertension among Faculty Members of Health Sciences College at South Saudi Arabia: Prevalence and Risk Factors
Last modified: 2021-06-30 17:35:27