A Review of Research Studies on Cyber Terror

Author(s):  
Esra Söğüt ◽  
O. Ayhan Erdem

Thanks to the internet, the distances between the countries are easily overcome and the communication network rapidly expands. This situation also affects the cyber security of the countries to a great extent. Attacks on critical infrastructures, companies, and public institutions can be magnitude that make great harms. These developments in cyber space bring new problems. One of them is cyber terror. Cyber terror does not have a certain and well-known definition. Cyber terror is the realization of terrorist acts in the field of cyber war. In addition, cyber space is a place of display for terrorist acts. The effects of cyber terror attacks have reached a level to scare all countries. There is not enough information about the definition, characteristics, methods used in cyber terror attacks and cyber terror groups. It is important for national administrators and staff to become conscious and to become informed about cyber terror. In this chapter, information will be presented, endeavors on awareness-creation will be made, and a role of guiding the future studies will be taken.

2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Dylan Rafferty ◽  
Kevin Curran

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information.  In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.


Author(s):  
M. Pleskach

The article is devoted to the issue on balancing the important interests of a person, a society and the state in cyber space by means of administrative law. The purpose of this article is to determine the legal nature and the role of the correspondence of the important interests of a person, a society and the state in cyber space in the context of administrative and legal provision of cyber security. The paper also deals with a proper balance between the law-enforcement interests of the state and the respect for fundamental human rights. The method of analysis has revealed in clarifying some features of concepts "interest", "need", "right". The method of synthesis has been used to define common concepts, for example "person's interest in cyberspace". Comparative legal method has been used in the process of comparison of the legislation of Ukraine and the international legislation that governs the issue on balancing the important interests of a person, a society and the state in cyber space. The author of this research presents the possible structure of person's cyber security through a set of important person's rights and interests in cyberspace, for example, the right to access to the Internet; the right to protect personal data in cyberspace; the right to be protected from aggressive marketing technologies in cyberspace, the prohibition of monitoring, including through cookies, HTTP, HTML5 markers or other technologies; the right to education, the right to access knowledge through the use of cyberspace etc. Conclusions and proposals of this research can be used for further research and for improving the administrative and information legislation of Ukraine, including the Law of Ukraine "On the Fundamental Principles of Cyber Security of Ukraine". Keywords: the balance of interests of the person, society and state, cyber space usage, public interest, private interest.


2020 ◽  
Vol 2020 (27) ◽  
pp. 20-24
Author(s):  
Hazlina Shaik Md Noor Alam

This paper discourses several issues stemming from whistleblowing. These include, but are not limited to, imposition of liability for inaction in the face of wrongdoing, to scrutinising the available legislative protections for whistleblowers. This paper will also discuss whistleblowing in relation to cyber whistleblowing, which essentially means making disclosures on any misconduct that occurs on the internet. Cyber whistleblowing can provide the basic framework for combating misdeeds online, as it forms a central part of cyber security. Whistleblowing has its roots in less than desirable circumstances, often offering little to no benefit to whistleblowers involved. The act of blowing the whistle, all share common traits, to call attention too, and to punish any and all wrongdoings. Legitimising whistleblowing would enormously help to remove the stigma that is often tied to whistleblowers. This would also give rise to more voluntary whistleblowing in relation to cyber security.


Author(s):  
Andrea Chiappetta

Analyzing the evolution of new generation peripherals can affirm that the next decade will be characterized by the exponential increase in the number of “objects” interconnected to the internet that will be more able to communicate with each other independently and will lead to the affirmation of the paradigm internet of things (IoT), which will revolutionize everyday life on a global level. This evolution will concern not only the business realities, interested in the development of applications and systems necessary to emerge and be competitive on the market but also the ordinary citizens who will be surrounded by interconnected objects able to facilitate their everyday life. This aspect implies particular attention to the implementation of solutions oriented to cyber security necessary to guarantee an efficient and effective level of protection against the threats coming from the “world” internet, known by the term cyber space.


Author(s):  
Mihail Pavlik ◽  
Konstantin Borichev

The article is devoted to the consideration of the current phenomenon – «the terrorism of individuals». In particular, it is presented the definition of the concept in question, its main specificity and current trends. The article describes the terrorist acts committed by loner terrorists in the period from 2017 to 2020 in Europe, as well as an analysis of similar crimes from 2000 to 2014. Special attention is paid to the role of international terrorist organizations in their work with their followers in the form of individual terrorists.The features of preparation of the investigated terrorist acts, including the means, tools and methods of their commission, are considered. It was done the analysis of the ideological component in the illegal activities of loner terrorists, and were identified the main directions of their terrorist ideology. The role of the Internet, social networks and messengers in terrorist activities was studied. Proposals to counteract the terrorism of individuals and improve the effectiveness of counter-terrorism measures in general are presented. As a result of the study, the fundamental directions of anti-terrorist activities in Russia in the sphere of countering the terrorist threat posed by loner terrorists were identified. Special attention is paid to the prevention of lone-person terrorism and the participation of representatives of public and religious associations and national diasporas in this activity.The features of preparation of the investigated terrorist acts, including the means, tools and methods of their commission, are considered. It was done the analysis of the ideological component in the illegal activities of loner terrorists, and were identified the main directions of their terrorist ideology. The role of the Internet, social networks and messengers in terrorist activities was studied. Proposals to counteract the terrorism of individuals and improve the effectiveness of counter-terrorism measures in general are presented. As a result of the study, the fundamental directions of anti-terrorist activities in Russia in the sphere of countering the terrorist threat posed by loner terrorists were identified. Special attention is paid to the prevention of lone-person terrorism and the participation of representatives of public and religious associations and national diasporas in this activity.


Author(s):  
Sunil. C. Pawar ◽  
R. S. Mente ◽  
Bapu. D. Chendage

Cyberspace is a domain that uses the electronic and electromagnetic spectrum to store, modify, and exchange data through network and system-related physical infrastructures. Cyberspace is an endless space known as the Internet. Computer transactions, especially transactions between different computers, can be viewed as a space. Images and text on the Internet exist in cyberspace. The term is used in conjunction with virtual reality, giving the name of the imaginary place where a virtual object exists. If a computer creates a picture of a building that allows the architect to "walk in" and see what the nature of a design is, the building is said to be in cyberspace.Cybercrime is a series of organized criminal attack cyberspace and cyber security. Cybercrime such as Hacking into computer,this can be through a network system and clicking on unfamiliar links connecting to unrecognized Wi-Fi, downloading software and files to unsafe sites, consuming energy, electromagnetic radiation waves, and more. Cyber security is a serious problem and must be taken seriously as it has become a national concern. Currently, most electronic devices such as computers, laptops and cell phones come with built-in firewall security software, but even so, computers are not 100 percent accurate and reliable in protecting our data.


2021 ◽  
Vol 21 (3) ◽  
pp. 65-94
Author(s):  
Darko Trifunović ◽  
Zoran Bjelica

Cyberspace has become an indispensable part in which special operations such as cyber war or warfare take place. The role of special war as the use of so-called soft power was emphasized. The country's number of potential adversaries in cyber warfare is unlimited, making highly endangered aspects of cyber civilian infrastructure, which is essentially military readiness, including the mobilization of forces through the civilian sector, also a likely target. A special type of cyber war or warfare is hybrid warfare. This type of warfare is increasingly resorted to because it is extremely cheaper than the conventional method of warfare and at the same time brings exceptional results. The first thing that affects cyber security policy analysts comes with the issue of neutrality, as well as the huge variety of assessments about future attack and defense technologies. There is also a consideration that the new (problematic) cyber technology will be deployed in a short period of time, in time periods, in just a few days in terms of warnings. Second, is the trends in cyber-attack and defense technologies and who is following those processes. Third, decision making technology having in mind high-performance computers, technologies that are well known, although rapidly evolving, are increasingly seen as a basic means of managing cyber defense at the national military and security level, as well as a new weapon in the hands of opponents. Fourth, role of intelligence in planning future scenarios for defense against hybrid or any other cyber threat/s.


Author(s):  
Sumanta Bhattacharya ◽  
Bhavneet Kaur Sachdev

The Telecom Sector of India has grown over the years and emerged as the second largest today. The reliance Jio has planned to launch 5G in the second half of the 2021. since the launch of Jio we have seen a rapid penetration of Internet services in India. India has the 2nd largest telecom industry in India and the cheapest net provider to its people. There are 500 million active data users and by 2024 it is estimated to have more than 800 million active users and manufacture of 1 billion smart phones in the upcoming years. India is also working towards its objective to empower people digitally. We have seen a rise in the use of digital platform during the pandemic period and also India is taking it steps ahead towards digital economy. The sad reality behind this is even where India is about to launch 5G service in India 90% of the population in India are digitally illiterate with only 8% of the population have access to a laptop or a computer. India also has a poor cyber security system and the data is vulnerable of every user. We also have poor tower connection in many areas with only 25 % of the net is connected by fiber. India needs to upgrade its telecom industry and provide net facilitates to all its people as the Internet is going to dominate the future. India’s Telecom industry contributes to 6.5% of the GDP.


Author(s):  
Shawn M. Powers ◽  
Michael Jablonski

Contemporary discussion surrounding the role of the Internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources. This book conceptualizes this real cyber war as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems, but also, and more importantly, the variety of ways the internet is used to further a state's economic and military agendas. Moving beyond debates on the democratic value of new and emerging information technologies, the book focuses on political, economic, and geopolitical factors driving internet freedom policies, in particular the U.S. State Department's emerging doctrine in support of a universal freedom to connect. It argues that efforts to create a universal internet built upon Western legal, political, and social preferences is driven by economic and geopolitical motivations rather than the humanitarian and democratic ideals that typically accompany related policy discourse. In fact, the freedom-to-connect movement is intertwined with broader efforts to structure global society in ways that favor American and Western cultures, economies, and governments. The book reveals how internet policies and governance have emerged as critical sites of geopolitical contestation, with results certain to shape statecraft, diplomacy, and conflict in the twenty-first century.


2005 ◽  
Vol 4 (4) ◽  
pp. 403-423 ◽  
Author(s):  
Peter P. Nieckarz

The interactions based around the taping, trading, and collecting of live music performances have evolved into a phenomenon that may aptly be referred to as a community. What is most remarkable about this is that the vast majority of these activities now take place over the Internet. The emergence of virtual community is addressed by sociological theories that address the increasingly disembedded nature of social structure. This article is a participant observation that specifically examines if trading is indeed a community, and demonstrates how this is facilitated through the proliferation of the Internet and other technologies. The findings reveal a phenomenon that does exhibit many characteristics of a traditional community; though acceptance or rejection of the notion of virtual community is contingent upon which definition of community one uses.


Sign in / Sign up

Export Citation Format

Share Document