Cyberterrorism Cover Image
  • Price 4.90 €

Terorismul cibernetic
Cyberterrorism

Author(s): Adrian Cristian Moise
Subject(s): Law, Constitution, Jurisprudence
Published by: C.H. Beck Publishing House - Romania
Keywords: Cyberterrorism;internet;cybercrime;terrorism;cyberspace;information system;cyberterrorist atack;The Game Theory

Summary/Abstract: Terrorist attacks committed in the cyberspace represent a category of offences in the cyberspace, which refer to the abuses committed on the information and communication technology, this phenomenon being known also as cyberterrorism.Cyberterrorism encompasses both terrorism and cybercrime. Terrorism is not a new phenomenon, being used to describe criminal behaviours long time before the occurrence and development of information and communication technology. Serious disturbance or destruction of computer networks of a State represent the most important targets of a terrorist attack in cyberspace. The possible targets of an attack in the cyberspace may be the government networks, the telecommunication networks, the navigation systems of maritime and air transportation, water control systems, energetic systems, financial systems, or any critical functions for the society.One of the most important terrorist attacks in cyberspace is the flooding of computer systems and networks with millions of messages from the networks made of hundreds of thousands of computers compromised in the whole world through a coordinated terrorist activity.The Internet is used in terrorist activities through the following means: propaganda of terrorist activities; financing of terrorist activities; training of terrorist activities; planning of terrorist activities; execution of terrorist activities; cyberterrorist attack.The fight against cyberterrorism can be seen as a game which involves two players: a player who attacks the information systems or networks (the cyberterrorist) and a player who wants to protect the information systems and networks (the cybersecurity expert). Therefore, the present study emphasizes that the battle between the cyberterrorist the cybersecurity expert can be explained through the Game Theory.

  • Issue Year: 2015
  • Issue No: 10
  • Page Range: 563-568
  • Page Count: 6
  • Language: Romanian
Toggle Accessibility Mode