IIUM Repository

Cyberterrorism definition patterns and mitigation strategies: A literature review

SEissa, Israa G. and Ibrahim, Jamaludin and Yahaya, Nor-Zaiasron (2017) Cyberterrorism definition patterns and mitigation strategies: A literature review. International Journal of Science and Research (IJSR), 6 (1). pp. 180-186. ISSN 2319-7064

[img] PDF - Published Version
Restricted to Repository staff only

Download (442kB) | Request a copy

Abstract

This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies.

Item Type: Article (Journal)
Additional Information: 6202/54453
Uncontrolled Keywords: Cyber Terrorism; Targeted attacks, Cyber Security; People, Process, Technology; Mitigation Strategies
Subjects: H Social Sciences > HM Sociology > HM811 Deviant behavior. Social deviance
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System
Depositing User: Jamaludin Ibrahim
Date Deposited: 10 Mar 2017 16:01
Last Modified: 13 Dec 2017 18:07
URI: http://irep.iium.edu.my/id/eprint/54453

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year