Metrics

  • citations in SCIndeks: [1]
  • citations in CrossRef:[2]
  • citations in Google Scholar:[]
  • visits in previous 30 days:14
  • full-text downloads in 30 days:4

Contents

article: 3 from 4  
Back back to result list
2016, vol. 58, iss. 2, pp. 206-222
Cyber terrorism and the use of the internet for terrorist purposes
University of Belgrade, Faculty of Security Studies, Serbia

emailjonev.katarina@gmail.com
Keywords: cyber terrorism; terrorism; cyber space; cyber attacks; national infrastructure
Abstract
Thousands of cyber attacks are executed on a daily basis, with larger or smaller intensity and with different consequences. Cyber attacks and cyber terrorism present the new threat for states and their security. Cyber attackers have already demonstrated capacities to endanger functioning of vital national infrastructure. The question is if the terrorists can do the same thing. Internet and computer systems have become powerful resource on which modern societies rely. Taking into account that infrastructure such are dams, electrical networks, financial sector and money transactions, civilian transport, military defense systems, depend on the computer systems, there is justified fear that cyber terrorists can provoke and disable functions of the attacked system and threaten people's lives by using cyber attacks. This kind of threat to the state cannot be ignored. Although these kinds of attacks have not occurred yet, there is a potential danger they may happen in the future. This paper also aims to point out the difference between cyber terrorism as the illegal act in the cyber space and the simple terrorist activities in cyber space by using the Internet and computers. Cyber terrorism is a global issue, therefore it requires a global solution.
References
Arthur, S. (2014) Chinese hackers suspected of interfering with US satellites. http://www.guardian.co.uk/technology/2011/oct/27/chinese-hacking-us-satellites-suspected, 5.9.2014
Caplan, N. (2013) Cyber war: The challenge to national security global security studies. Winter, Vol. 4, Issue 1, pp. 93-115
Center for Strategic and International Studies (1998) Cybercrime, cyberterrorism, cyberwarfare. Avertingand Electroinic Waterloo, https://cryptome.org/jya/cyber-trip.htm, 10.10.2015
Conway, M. (2005) The media and cyberterrorism: A study in the construction of reality. in: First International conference on Information Revolution and the changing face of International relations and security, 23-25. May 2005, Lucerne, Swiss, 12.9.2015, http://www.politicalavenue.com/PDF/MConwayTerrorism.pdf
Conway, M. (2006) Terrorist ‘use' of the Internet and fighting back. in: Conference Cyber safety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Oxford Internet Institute (OII), Oxford University, UK, 8-10 September, 2006
Denning, D. (2001) Activism, hactivism, cyberterrorism, networks and netwars. RAND, https://www.rand.org/content/dam/rand/pubs/monographreports/MR1382/MR1382.ch8.pdf, 1.4.2015
Dobre, T., Meghean, K. (2015) Serious gaming: Instrument for addressing global threats. Bezbednost, Beograd, vol. 57, br. 2, str. 50-59
Gaćinović, R. (2012) Oblici savremenog terorizma. Nauka, bezbednost, policija, vol. 17, br. 1, str. 1-17
Gerce, M. (2010) Challenges in developing a legal response to terrorist use of the internet defence against terrorism. Review DATR, Vol. 3, No. 2, pp. 3, http://www.coedat.nato.int/publication/datr/volumes/datr6.pdf, 10.9.2015
Iklódy, G. (2010) The new strategic concept and the fight against terrorism: Challenges & opportunities defence against terrorism. Review DATR, 3(2), 3, http://www.coedat.nato.int/publication/datr/volume6/01The_New_Strategic_Concept_and_the_Fight_Against_Terrorism_Challenges&Opportunities.pdf, 1.9.2015
Imram, A. (2014) Debating the term cyber-terrorism: issues and problems. Internet Journal of criminology, dostupno 5., 2015; 10; http://www.internetjournalofcriminology.com/awan_debating_the_term_cyber-terrorism_ijc_jan_2014.pdf
Jonev, K., Hatidža, B. (2015) Sajber napad - izazov u izučavanju strategije i vojne strategije. in: Zbornik radova sa naučnog skupa Škole nacionalne odbrane, SORLOG, str. 167-176
Krivokapić, V. (2002) Terorizam kao oblik organizovanog kriminaliteta i mere suprotstavljanja. Bezbednost, Beograd, vol. 44, br. 5, str. 665-684
Lewis, J. (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, https://www.csis.org/analysis/assessing-risks-cyber-terrorism-cyber-war-and-other-cyber-threats, 13.5.2015
Mladenović, D.D., Jovanović, D.M., Drakulić, M.S. (2012) Tehnološki, vojni i društveni preduslovi primene sajber ratovanja. Vojnotehnički glasnik, vol. 60, br. 1, str. 70-98
Schjolberg, S. (2006) Terrorism in cyberspace-myth or reality?. in: NATO Advanced Research Workshop on Cyberterrorism, Sofia, Bulgaria, http://www.cybercrimelaw.net, 11.5.2014
Simeunović, D. (2009) Terorizam. Beograd: Pravni fakultet
Taliharm, A.M. (2010) Cyberterrorism in theory or in practice?. Defence Against Terorrism Review, 3(2), 59-74, http://www.coedat.nato.int/publication/datr/volume6/05Cyberterrorism_in_Theory_or_in_Practice.pdf, 1.9.2015
Tripathi, S. (2015) Cyber: Also a Domain of War and Terror. Strategic Analysis, 39(1): 1-8
Weimann, G. (2005) Cyberterrorism: The Sum of All Fears?. Studies in Conflict & Terrorism, 28(2): 129-149
 

About

article language: Serbian
document type: Review Paper
DOI: 10.5937/bezbednost1602206J
published in SCIndeks: 17/02/2017

Related records

No related records