全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cybersecurity and Domestic Terrorism: Purpose and Future

DOI: 10.4236/jsea.2023.1610028, PP. 548-560

Keywords: Cyber-Attacks, Cybercrime, Cybersecurity, Cyber Threats, Domestic Terrorism

Full-Text   Cite this paper   Add to My Lib

Abstract:

The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity.

References

[1]  Carpenter, N. (2018) The Ad Hoc Federal Crime of Terrorism: Why Congress Must Adequately Amend the Statute to Address Domestic Extremism. St. John’s Law Review, 92, 393-418.
[2]  Gafni, R. and Pavel, T. (2019) The Invisible Hole of Information on SMB’s Cybersecurity. Online Journal of Applied Knowledge Management (OJAKM), 7, 14-26.
https://doi.org/10.36965/OJAKM.2019.7(1)14-26
[3]  Ionita, G.I. (2014) Preliminary Observations on Cybercrime, Cybersecurity, and National Security. Journal of Public Administration, Finance and Law, 133-139.
[4]  Lewis, J.A. (2002) Assessing the Risks of Cyber Terrorism, Cyberwar, and Other Cyber Threats. Center for Strategic & International Studies, Washington, DC.
[5]  Osei-Bryson, K.M. and Vogel, D. (2014) Special Issue on Cyber-Security for Development. Information Technology for Development, 20, 93-95.
https://doi.org/10.1080/02681102.2014.883115
[6]  Shah, A., Ganesan, R. and Jajodia, S. (2019) A Methodology for Ensuring Fair Allocation of CSOC Effort for Alert Investigation. International Journal of Information Security, 18, 199-218.
https://doi.org/10.1007/s10207-018-0407-3
[7]  Robert, W.T., Eric, J.E. and John, L. (2013) Digital Crime and Digital Terrorism. Pearson Publishing, Dallas.
[8]  Taddeo, M. (2019) Is Cybersecurity a Public Good? Minds and Machines, 29, 349-354.
https://doi.org/10.1007/s11023-019-09507-5
[9]  Shank, S. (2011) Cybersecurity: Domestic and Legislative Issues. American University National Security Law Brief, 1, 137-140.
[10]  Townsend, R. and Karp, A. (2012) Cyber Security: Defining Cyber Terrorism and Permissible Responses. New York Times.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133