skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 199966 Find in a Library
Title: Cyber Terrorism: An Examination of the Critical Issues
Journal: Journal of Information Warfare  Volume:2  Issue:2  Dated:2003  Pages:1-14
Author(s): Mark Henych; Stephen Holmes; Charles Mesloh
Date Published: 2003
Page Count: 14
Type: Issue Overview
Format: Article
Language: English
Country: Australia
Annotation: This paper discusses types of cyber (computer-related) terrorist attacks and documents instances of such attacks, followed by policy recommendations for countering such attacks.
Abstract: "Cyber terrorism" involves the use of computer networks, including the Internet, to steal, damage, and alter information. The current literature indicates that incidences of this type of activity are on the rise, such that this type of crime poses a real and present danger to the United States' critical information infrastructure (CII). These crimes and criminals are not only financially motivated, but some may attempt to hack into private and government networks for peer recognition. A review of military literature indicates that the CII and the defense information infrastructure are under constant, organized, and repetitious attacks from other nation states, as well as from points of origin within the Continental United States. Examples of private-sector intrusions are endless. The threat of cyber terrorism is proportionate to the increasing dependence on computers and their interconnectivity. The various types of attacks in cyber space include but are not limited to computer viruses, denial-of-service attacks, distributed denial-of-service attacks, tribal flood network attacks, Internet worms, Trojan horse attacks, spoofing, hacking, and zombie programs. This paper profiles some of the more conventional cyber terrorist attacks and techniques. This paper advises that additional research is needed to more accurately quantify the threat to the United States' CII. Also, policies should be considered for the regulation of the Internet, which has become an instrument of "war." 36 references
Main Term(s): Domestic Preparedness
Index Term(s): Computer privacy and security; Computer related crime; Counter-terrorism tactics; Domestic terrorism; International terrorism; Terrorist tactics
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=199966

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.