2015
DOI: 10.5038/1944-0472.8.4.1460
|View full text |Cite
|
Sign up to set email alerts
|

Deterring and Dissuading Cyberterrorism

Abstract: Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested. Some strategists and policy makers believe that acts of cyberterrorism, especially by non-state actors, may prove to be undeterrable. Yet the leadership of both state and non-state actors tend to act rationally and function strategically, and therefore they can, in fact, be deterred to some degree. Helping to shape the legitimate opti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 1 publication
(1 reference statement)
0
3
0
Order By: Relevance
“…In the year 1990, the National Academy of Sciences alerted the first cyber-attack termed 'Digital Pearl Harbour' (Weimann, 2004). A decade earlier cyber terrorism was in its infancy, but now is a deadly threat leaving the world totally off guard; the approaches are fundamental and naive but, patron-less destruction advanced with a much higher degree of efficiency through the internet technology (Klein, 2015). Mark Potok, a Southern Poverty Law Centre analyst, viewed: "The internet is an important piece of the leaderless struggle approach.…”
Section: Cyber Terrorism: An Emerging Threatmentioning
confidence: 99%
“…In the year 1990, the National Academy of Sciences alerted the first cyber-attack termed 'Digital Pearl Harbour' (Weimann, 2004). A decade earlier cyber terrorism was in its infancy, but now is a deadly threat leaving the world totally off guard; the approaches are fundamental and naive but, patron-less destruction advanced with a much higher degree of efficiency through the internet technology (Klein, 2015). Mark Potok, a Southern Poverty Law Centre analyst, viewed: "The internet is an important piece of the leaderless struggle approach.…”
Section: Cyber Terrorism: An Emerging Threatmentioning
confidence: 99%
“…Deterrence by punishment, and imposing costs on an attributed attacker, are contemporarily advocated approaches to also deal with cyberterrorism (Klein, 2015;. Despite all the challenges of understandable communication and rational decision-making, deterrence may function among governments.…”
Section: Policing and Managing Cyberterrorismmentioning
confidence: 99%
“…It is also important for organizations to have a plan in place for responding to a cyberattack, which should include identifying key personnel and establishing clear channels of communication in the event of a cyberattack. There are several network and system security measures ( Klein, 2015 ) that can be adopted to prevent cyberterrorism such as, ensuring the use of strong, unique passwords and enabling two-factor authentication, keeping all the software and security system up to date with latest security patches, using authenticated and strict firewalls, implementing intrusion systems that may alert administration of the potential breach, utilizing a trusted antivirus software, conducting regular security assessments to identify network and system vulnerabilities, implementing access control mechanisms to limit the access of unauthorized users towards sensitive data, having a plan in place in case of a cyber-attack, making sure that employees are educated about cybersecurity best practices, such as not sharing passwords and not clicking on suspicious links etc.…”
Section: Introductionmentioning
confidence: 99%