CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS

被引:0
|
作者
Prislan, Kaja [1 ]
Bernik, Igor [2 ]
机构
[1] Univ Maribor, Fac Criminal Justice & Secur, Maribor, Slovenia
[2] Fac Criminal Justice & Security, Informat Security Dept, Ljubljana, Slovenia
关键词
Cyber Terrorism; Information Security; Risks; Threats; Managing Threats;
D O I
暂无
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Purpose: Important information is saved in the information systems of organizations; therefore, their security plays a vital role for the appropriate operation of any organization. Cyber terrorism, which takes advantage of abilities and weaknesses of computers and online services, is one of those threats. The purpose of this article is to examine cyber terrorism and the way in which organizations understand and manage it. The problem is that many organizations are not even aware of it. For this reason, a survey has been conducted among various organizations. In order to learn about the extent and nature of cyber terrorism, a descriptive analysis of secondary sources was employed. The main problem is incomprehension of such threats because in public it is mostly mistaken for other known attacks on information systems. To date, there has been no research conducted on cyber terrorism in Slovenia. Therefore, this study represents the first opportunity for Slovenia to learn about the risks and threats of as well as how to effectively combat such risks. Design/Methodology/Approach: The focus of the study presented in this chapter relied on organizational perceptions about cyber terrorism within Slovenia. For this purpose, a research has been conducted among different organizations. The results of the research unveil the problems of threat incomprehension, while threats also adjust to changes. With minimal effort and knowledge, terrorism can cause terrible consequences and threaten the existence of every organization. Methods and techniques of such attacks do not differ from the classic threats. The most common attacks focus on information systems and critical infrastructure. Findings: The consequences of a terrorist attack on the organization's information system are mostly economic damage, injuries or casualties among employees. The threats and protection needs are classified according to those consequences, which can be caused by cyber terrorism. Protection against the cyber threat is therefore necessary; however, it depends on every individual organization. Research limitations/Implications: The results cannot be generalized as a relatively small number of companies were included in the research. Practical implications: The article represents a useful source of information for companies establishing an information security risk management system and represents a basis for further researches. Originality/Value: Organizations have a chance to study the nature of this modern information threat and get to know it better. They will have the opportunity to see what kind of understanding and protection other companies use against it. At this point they will have a reference point in order to see what protection level they currently attain. A similar research has never been conducted in Slovenia before. Therefore, organizations will have the opportunity to get acquainted with imperfections in understanding cyber terrorism as a threat and to adapt properly to changes in the virtual world.
引用
收藏
页码:175 / +
页数:4
相关论文
共 50 条
  • [1] Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security
    Zimba, Aaron
    Wang, Zhaoshun
    Mulenga, Mwenge
    Odongo, Nickson Herbert
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (04) : 297 - 308
  • [2] SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE
    Ionita, Mihai-Gabriel
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 63 - 67
  • [3] The Potential Threat of Cyber-Terrorism on National Security of Saudi Arabia
    Alqahtani, Abdulrahman
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 231 - 239
  • [4] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [5] National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations
    Li Yanzhao
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 532 - 535
  • [6] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
  • [7] COUNTERING TERRORISM WITH CYBER SECURITY
    Westby, Jody R.
    [J]. INTERNATIONAL SEMINARS ON NUCLEAR WAR AND PLANETARY EMERGENCIES - 36TH SESSION, 2007, : 279 - 294
  • [8] Acquiring Cyber Threat Intelligence through Security Information Correlation
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 415 - 421
  • [9] Terrorism, security, and the threat of counterterrorism
    Wolfendale, Jessica
    [J]. STUDIES IN CONFLICT & TERRORISM, 2007, 30 (01) : 75 - 92
  • [10] Cyber security attacks to modern vehicular systems
    Pan, L.
    Zheng, X.
    Chen, H. X.
    Luan, T.
    Bootwala, H.
    Batten, L.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 90 - 100