International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 175

Review Papers | Information Technology | Malaysia | Volume 6 Issue 1, January 2017


Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review

Israa G. SEissa, Jamaludin Ibrahim, Nor-Zaiasron Yahaya


Abstract: This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies.


Keywords: CyberTerrorism, Targeted attacks, Cyber Security, People, Process, Technology, Mitigation Strategies


Edition: Volume 6 Issue 1, January 2017,


Pages: 180 - 186


How to Cite this Article?

Israa G. SEissa, Jamaludin Ibrahim, Nor-Zaiasron Yahaya, "Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20163936, Volume 6 Issue 1, January 2017, 180 - 186

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cyber Security'

Downloads: 127

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Downloads: 141

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 5 - 10

Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure

M Hari Haran

Share this Article

Similar Articles with Keyword 'People'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 2

Research Paper, Information Technology, Vietnam, Volume 10 Issue 4, April 2021

Pages: 798 - 803

Enhancing the Legal Awareness of Vietnamese Basic Officers

Tran Thuy Linh

Share this Article

Similar Articles with Keyword 'Process'

Downloads: 179

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'Technology'

Downloads: 322 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article
Top