Cyberterrorism and Information Security

Charles Jaeger, Southern Oregon University

Introduction

The Cyberterrorism Threat

Acts That May Be Cyberterrorism

Other Warnings about Cyberterrorism

Exaggerated Threats?

Defining Cyberterrorism

Definitions in Use

Extended Definitions

Support for Conventional Terrorism

Communication in Terrorism

A Five-Level Operational Model

How Cyberterrorism Occurs

Convergence of the Physical and Virtual Worlds

Vulnerabilities: External, Internal, Other

Tools of Cyberterrorists

BGP Tables, DNS Poisoning, and DDoS

RMA and Asymmetric Response

Cyberspace Warfare

Sponsors and Support

Cyberterrorism Sponsors

The Worldwide Perspective

Controlling Cyberterrorism

General Strategies

Information Technology Professionals

Business and Industry

Government

Institutions, Organizations, and Conferences

Higher Education Institutions

Small Business and Individuals

Who Will Win the Battle of Cyberterrorism?

Glossary

Cross References

References

INTRODUCTION

In the past several years, the world has come face to face with terrorists who are becoming more extreme. At the same time, the world has become increasingly dependent on using computers and networks to manage the way we work, communicate, and live. Terrorism, used throughout human history in one form or another, has found a powerful new weapon.

Although most terrorist organizations remain either national or regional, cyberspace gives them tools to become global in reach and coordination. A cyberattacked nuclear power ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.