Responses to Cyber Terrorism
Centre of Excellence Defence Against Terrorism
IOS Press, 2008 - Political Science - 145 pages
Looks at the difficulty of arriving at a definition of cyber terrorism. This publication examines cyber terrorism in the proper sense of the term and how to respond in terms of technology, awareness, and legal/political measures. However, there is also the related question of responding to the terrorist presence on the Internet.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Interwoven Domain of Enabling Technologies and Cultural Interaction
Institutionalization of a WebFocused Multinational CounterTerrorism Campaign Building a Collective Open Source Intelligent System
Critical Information Infrastructure Protection
Use of the Internet by Terrorists
The Reliance of alQaeda on the Internet
General Overview of the Available Mechanisms to Facilitate an Overwhelming Task
International Coordination of Prosecution and Prevention of Cyber Terrorism
activities agencies al Qaeda al-Qaeda Alneda analysis Ankara audience bomb bot-nets campaign communication computer systems Convention Convention on Cybercrime Council of Europe counter-terrorism countries criminal critical infrastructure cyber attacks Cyber Crime cyber security cyberspace cyberterrorism Defence Against Terrorism Defense e-mail electronic Estonia European Europol example forums global jihad governmental hackers hacking identify important information systems information technology Infrastructure Protection institutions international cooperation Internet Iraq Islamist Islamist terrorism issues jihad jihad movement jihadist Kurdish last visited launched law enforcement mass media monitoring mujahideen Muslim NATO open source Open Source Intelligence operations participants PKK/KONGRA-GEL website possible potential private sector propaganda Qaeda recruits Responses to Cyber Retrieved March SCADA SCADA systems September 2007 servers strategy targets telecommunications terrorist content terrorist groups terrorist organizations terrorist websites threat Turkish users vulnerabilities