The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity.
References
[1]
Carpenter, N. (2018) The Ad Hoc Federal Crime of Terrorism: Why Congress Must Adequately Amend the Statute to Address Domestic Extremism. St. John’s Law Review, 92, 393-418.
[2]
Gafni, R. and Pavel, T. (2019) The Invisible Hole of Information on SMB’s Cybersecurity. Online Journal of Applied Knowledge Management (OJAKM), 7, 14-26. https://doi.org/10.36965/OJAKM.2019.7(1)14-26
[3]
Ionita, G.I. (2014) Preliminary Observations on Cybercrime, Cybersecurity, and National Security. Journal of Public Administration, Finance and Law, 133-139.
[4]
Lewis, J.A. (2002) Assessing the Risks of Cyber Terrorism, Cyberwar, and Other Cyber Threats. Center for Strategic & International Studies, Washington, DC.
[5]
Osei-Bryson, K.M. and Vogel, D. (2014) Special Issue on Cyber-Security for Development. Information Technology for Development, 20, 93-95. https://doi.org/10.1080/02681102.2014.883115
[6]
Shah, A., Ganesan, R. and Jajodia, S. (2019) A Methodology for Ensuring Fair Allocation of CSOC Effort for Alert Investigation. International Journal of Information Security, 18, 199-218. https://doi.org/10.1007/s10207-018-0407-3
[7]
Robert, W.T., Eric, J.E. and John, L. (2013) Digital Crime and Digital Terrorism. Pearson Publishing, Dallas.
[8]
Taddeo, M. (2019) Is Cybersecurity a Public Good? Minds and Machines, 29, 349-354. https://doi.org/10.1007/s11023-019-09507-5
[9]
Shank, S. (2011) Cybersecurity: Domestic and Legislative Issues. American University National Security Law Brief, 1, 137-140.
[10]
Townsend, R. and Karp, A. (2012) Cyber Security: Defining Cyber Terrorism and Permissible Responses. New York Times.