Cyber Terrorism
Latest Publications


TOTAL DOCUMENTS

7
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781599040219, 9781599040233

2006 ◽  
pp. 147-165
Author(s):  
Andrew Colarik

Briefly put the previous information presented into a context for taking action. Ö Understand the relationship between user privacy and data usage. Ö Be aware of the relationship between security design and user features. Ö Present some of the major issues in securing the global information infrastructure. Ö Identify seven solutions for safeguarding the global information infrastructure from cyber criminals and cyber terrorists alike.



2006 ◽  
pp. 111-146
Author(s):  
Andrew Colarik

Recognize that through global access to information, we are all potential targets. Ö Begin to understand just how much information that can be used against us is available in electronic form. Ö Briefly discover the vulnerable aspects and characteristics in our economic sectors. Ö Identify the connection between the electronic world and the physical world. Ö Come to realize the degree to which we utilize economic momentum as a competitive advantage, and how cyber terrorism attacks serve to disrupt it.



2006 ◽  
pp. 58-81
Author(s):  
Andrew Colarik

Identify the major components of the global information infrastructure. Ö Begin to understand how communication network technologies are bringing the world closer together. Ö Come to understand the growing dependence that societies and businesses have on this infrastructure. Ö Discover the services, major mechanisms, and protocols that are used to secure the global information infrastructure. Ö Realize that the task of securing the global information infrastructure is an evolutionary process.



2006 ◽  
pp. 14-32
Author(s):  
Andrew Colarik

Create a foundational understanding of traditional terrorism in order to apply its goals, methods, and means to cyber terrorism. Ö Identify the key elements that comprise the term terrorism. Ö Understand the political orientation of terrorism. Ö Become aware of many of terrorism’s actors throughout the world. Ö Discern many of the goals of terrorist organizations.



2006 ◽  
pp. 1-13
Author(s):  
Andrew Colarik

Learn more about recent terrorist atrocities. Ö Identify the main sponsors of global terrorism today. Ö Comprehend the link between diminished terrorist attacks over time and their need to create new venues/methods of global reach and devastation. Ö Understand the organizational link between terrorists and technology. Ö Begin to discover the importance of securing the global information infrastructure.



2006 ◽  
pp. 82-110
Author(s):  
Andrew Colarik

Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems. Ö Recognize that there are many components that are vulnerable to attacks that are outside an individual’s or organization’s zone of control.



2006 ◽  
pp. 33-57
Author(s):  
Andrew Colarik

Begin to discern the connection between terrorism and technology. Ö Understand the evolution from hackers to crackers, crackers to cyber criminals, and cyber criminals to cyber terrorists. Ö Identify the key elements that comprise the term cyber terrorism. Ö Become familiar with the support role that a cyber terrorist can bring to a terrorist organization. Ö Understand the potential collaborations between criminal organizations and terrorist groups in attaining cyber skills.



Sign in / Sign up

Export Citation Format

Share Document