Chapter 20

Cyber Security Countermeasures to Combat Cyber Terrorism

Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick and Dimitrios Frangiskatos

Introduction

Any piece of work that seeks to discuss cyber terrorism must necessarily start with some definitions and descriptions to aid the reader to both differentiate and contextualize cyber terrorism from other areas of cyber security, such as cybercrime, malicious hacking, cyber fraud, and the numerous different types of system breaches, failures, and human error.

Most contemporary definitions of cyber terrorism focus on the following three aspects:

1. The motivation of the perpetrator(s)

2. The targeted cyber system

3. The impact on an identified population.

For example, the ...

Get Strategic Intelligence Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.