Fighting with Cyber Tenor and Terrorism: Threats and Precautions

被引:0
|
作者
Sagiroglu, Seref [1 ]
Arslan, Bilgehan [1 ]
机构
[1] Gazi Univ, Bilgisayar Muhendisligi, Ankara, Turkey
关键词
Cyber; Terror; Terrorism; Attack; Review; Struggle;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the widespread use of the internet, end-users spend most of their lives interacting with virtual environments. Malicious attackers use cyber world in line with their individual, political and economic ideas, beliefs, ambitions, goals, interests, expectations or missions in a positive or negative way according to the aims of their groups, societies or nations. The most important threat directly affecting individuals, societies or nations and ultimately our world is cyber terror. Terrorists make propaganda in virtual environments, gather fans or create sympathizers, attack critical infrastructures, damage personal and institutional portfolio of information, undermine trust in electronic environments and create infrastructure in chaos. Their greatest ambition is threatening the systems. In other words, they are struggling with national security. In this study; the concept of cyber terrorism, its scope, targets, attack approaches and impacts have been researched. Strategies and policies related to cyber terrorism have been analyzed and the findings obtained from this research have been evaluated. As a result, some recommendations have been made to fight cyber terrorism.
引用
收藏
页码:239 / 244
页数:6
相关论文
共 50 条
  • [1] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [2] Fighting Cyber Terrorism: comparison of Turkey and Russia
    Bicak, Melih Burak
    Bogdanova, Dana
    [J]. 2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 98 - 101
  • [3] Fighting Cyber Attacks with Sanctions: Digital Threats, Economic Responses
    Rusinova, Vera
    Martynova, Ekaterina
    [J]. ISRAEL LAW REVIEW, 2024, 57 (01) : 135 - 174
  • [4] Computer hacking and cyber terrorism: The real threats in the new millennium?
    Furnell, SM
    Warren, MJ
    [J]. COMPUTERS & SECURITY, 1999, 18 (01) : 28 - 34
  • [5] A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector
    Kumar, Venkatachary Sampath
    Prasad, Jagdish
    Samikannu, Ravi
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2018, 14 (02) : 101 - 119
  • [6] Improving Critical Infrastructure Protection and Resilience against Terrorism Cyber Threats
    Bologna, Sandro
    Lazari, Alessandro
    Mele, Stefano
    [J]. COMPREHENSIVE APPROACH AS SINE QUA NON FOR CRITICAL INFRASTRUCTURE PROTECTION, 2015, 39 : 79 - 90
  • [7] Challenged sovereignty: the impact of drugs, crime, terrorism, and cyber threats in the Caribbean
    Wallace, Wendell C.
    [J]. SECURITY JOURNAL, 2024,
  • [8] Fighting terrorism
    Timm, Klaus Juergen
    [J]. KRIMINALISTIK, 2006, 60 (8-9): : 498 - 498
  • [9] Fighting terrorism with democracy
    Rorty, R
    [J]. NATION, 2002, 275 (13) : 11 - +
  • [10] FIGHTING TOXIC TERRORISM
    KOHL, J
    SUD, A
    [J]. ALTERNATIVES-PERSPECTIVES ON SOCIETY TECHNOLOGY AND ENVIRONMENT, 1989, 16 (03): : 12 - 14