Amazon cover image
Image from Amazon.com

Cyber terrorism [electronic resource] : political and economic implications / Andrew Michael Colarik.

By: Contributor(s): Publication details: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2006.Description: electronic texts (xvii, 172 p. : ill.) : digital filesISBN:
  • 9781599040233 (ebook)
Subject(s): Genre/Form: Additional physical formats: No titleDDC classification:
  • 363.325 22
LOC classification:
  • HV6773 .C64 2006e
Online resources: Available additional physical forms:
  • Also available in print.
Contents:
1. Introduction -- 2. The power of terrorism -- 3. Cyber terrorism evolution -- 4. Global information infrastructure -- 5. Current cyber attack methods -- 6. Attack scenarios -- 7. Thoughts for the future.
Abstract: This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, this book puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references (p. 163-165) and index.

1. Introduction -- 2. The power of terrorism -- 3. Cyber terrorism evolution -- 4. Global information infrastructure -- 5. Current cyber attack methods -- 6. Attack scenarios -- 7. Thoughts for the future.

Restricted to subscribers or individual electronic text purchasers.

This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, this book puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.

Also available in print.

Mode of access: World Wide Web.

Title from PDF t.p. (viewed on June 5, 2010).

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu