International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 176

Malaysia | Information Technology | Volume 6 Issue 1, January 2017 | Pages: 180 - 186


Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review

Israa G. SEissa, Jamaludin Ibrahim, Nor-Zaiasron Yahaya

Abstract: This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies.

Keywords: CyberTerrorism, Targeted attacks, Cyber Security, People, Process, Technology, Mitigation Strategies

How to Cite?: Israa G. SEissa, Jamaludin Ibrahim, Nor-Zaiasron Yahaya, "Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review", Volume 6 Issue 1, January 2017, International Journal of Science and Research (IJSR), Pages: 180-186, https://www.ijsr.net/getabstract.php?paperid=ART20163936, DOI: https://dx.doi.org/10.21275/ART20163936


Download Article PDF


Rate This Article!

Received Comments

No approved comments available.


Top