Downloads: 176 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers | Information Technology | Malaysia | Volume 6 Issue 1, January 2017
Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review
Israa G. SEissa | Jamaludin Ibrahim [7] | Nor-Zaiasron Yahaya
Abstract: This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies.
Keywords: CyberTerrorism, Targeted attacks, Cyber Security, People, Process, Technology, Mitigation Strategies
Edition: Volume 6 Issue 1, January 2017,
Pages: 180 - 186
Similar Articles with Keyword 'Cyber Security'
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 12 Issue 3, March 2023
Pages: 1130 - 1133The Power of Miniature Sensors an Exploration to Smart Dust
Tushar Upadhyay | Jigar Bhavsar
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, United States of America, Volume 12 Issue 10, October 2023
Pages: 1221 - 1227