Review Papers | Information Technology | Malaysia | Volume 6 Issue 1, January 2017
Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review
Israa G. SEissa, Jamaludin Ibrahim, Nor-Zaiasron Yahaya
Abstract: This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies.
Keywords: CyberTerrorism, Targeted attacks, Cyber Security, People, Process, Technology, Mitigation Strategies
Edition: Volume 6 Issue 1, January 2017,
Pages: 180 - 186
How to Cite this Article?
Israa G. SEissa, Jamaludin Ibrahim, Nor-Zaiasron Yahaya, "Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20163936, Volume 6 Issue 1, January 2017, 180 - 186
How to Share this Article?
Similar Articles with Keyword 'Cyber Security'
Framework for Improving Critical Infrastructure Cyber Security
Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim
Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure
M Hari Haran
Similar Articles with Keyword 'People'
A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud
Dilipprasad.E, Ajay.R, K. Durairaj
Enhancing the Legal Awareness of Vietnamese Basic Officers
Tran Thuy Linh
Similar Articles with Keyword 'Process'
IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan
Hazrat Mohammad Wahdaty
Android Notes using Finger Print Authentication
Vaibhav Garg, Siddharth Yadav, Rishabh Kamal
Similar Articles with Keyword 'Technology'
The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study
Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor