Author: Marek Górka
Institution: Politechnika Koszalińska
Year of publication: 2017
Source: Show
Pages: 295-315
DOI Address: https://doi.org/10.15804/cip201718
PDF: cip/15/cip1518.pdf

Cyberterroryzm stwarza poważne i szybko rozwijające się zagrożenia dla społeczeństwa oraz infrastruktury krytycznej państwa. Fakt ten wywołuje istotne zmiany w zakresie zapobiegania oraz zwalczania terroryzmu. Cyfrowy świat, w którym żyje społeczeństwo zapewnia szerokie możliwości dla cyberprzestępczości, ponieważ inicjuje i zachęca do wykorzystania ukrytych możliwości Internetu. Cyberterroryzm jest rodzajem przestępstwa, który jest skierowany przeciwko państwu i jego obywatelom. Obecnie sieci komputerowe są zagrożone i codziennie atakowane z powodu m.in. niezdolności do utrzymania dynamicznego rozwoju usług internetowych oraz szeroko dostępnych narzędzi i technik hakerskich. Jest to najbardziej trudne wyzwanie w walce cyberterroryzmem. Jednak sam termin jest często niewłaściwie wykorzystywany i nadużywany. Zrozumienie niebezpieczeństwa cyberterroryzmu musi zaczynać się od klarownego określenia jego definicji.

Selected aspects of the definition of cyberterrorism and their importance in the perspective of security policy

Cyberterrorism creates serious and rapidly growing threats to society and the critical infrastructure of the state. This creates significant changes in the prevention and fight against terrorism. The digital world in which society is lived provides a wide range of opportunities for cybercrime as it initiates and encourages the use of hidden Internet capabilities. Cyberterrorism is a crime that is directed against the state and its citizens. Currently, computer networks are at risk and are attacked daily due to inter alia. The inability to maintain dynamic development of web services and widely available hacking tools and techniques. This is the most difficult challenge in the fight against cyberterrorism. However, the term itself is often misused and abused. Understanding the dangers of cyberterrorism must begin with a clear definition of its definition.

BIBLIOGRAFIA:

  • Aid M. M., Intel wars: The secret history of the fight against terror, Nowy Jork 2012.
  • Alqahtani A., The Potential Threat of Cyber‐Terrorism on National Security of Saudi Arabia, „International Conference on Information Warfare and Security” 2013.
  • Ayres N., Maglaras L. A., Cyberterrorism targeting the general public through social media, „Security and Communication Networks” 2016, vol. 9 (15).
  • Carr J., Inside Cyber Warfare, 2nd Edition Mapping the Cyber Underworld, Publisher: O’Reilly Media 2011.
  • Dean A., Cyber Threats in the 21st Century, „Security” 2012, vol. 49 (9).
  • Denning D., Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy, [w:] Networks and Netwars: The Future of Terror, Crime, and Militacy, red. J. Arquilla, D. Ronfeldt 2001.
  • Denning D., Cyberterrorism, Prepared for Estimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, http://www.cs.georgetown.edu/~denning/infosec/cvberterror.html.
  • Gorge M., Cyberterrorism: Hype or Reality?, „Computer Fraud & Security” 2007, vol. 2.
  • Jarvis L., Macdonald S., Nouri L., The Cyberterrorism Threat: Findings from a Survey of Researchers, „Studies in Conflict & Terrorism” 2014, vol. 37 (1).
  • Kontselidze A., Cyberterrorism – when technology became a weapon, „European Scientific Journal” 2015.
  • Lappin Y., Virtual Caliphate, Waszyngton 2011.
  • Matusitz J., Cyberterrorism: Postmodern State of Chaos, „Information Security Journal: A Global Perspective” 2008, vol. 17 (4).
  • McLaughlin K.L., Cyber Attack! Is a Counter Attack Warranted?, „Information Security Journal: A Global Perspective” 2011, vol. 20 (1).
  • Negroponte J. D., Palmisano S.J., Segal A., Defending an Open, Global, Secure, and Resilient Internet, Nowy Jork 2013.
  • Pedersen Ch., Much Ado about Cyber-space: Cyber-terrorism and the Reformation of the Cyber-security, „Pepperdine Policy Review” 2014, vol. 7 (1).
  • Regan T., When terrorists turn to the Internet Seemingly unconnected events may have a more sinister source: Series, „The Christian Science Monitor”, 1.07.1999.
  • Rid T., Cyber War Will Not Take Place, „Journal of Strategic Studies” 2011, vol. 35 (1).
  • Rollins J., Wilson C., Terrorist Capabilities for Cyberattack: Overview and Policy Issues, „CRS Report for Congress”, 22.01.2007.
  • Topor S., Cyber criminal and cyber terrorist – two concepts that need to be differently treated, International Scientific Conference „Strategies XXI” 2016, vol. 3.
  • Webster W., Cilluffo F., Cybercrime Cyberterrorism Cyberwarfare: Averting an Electronic Waterloo, Waszyngton 1998.
  • Weimann G., Cyberterrorism. How Real Is the Threat?, „Special Report” 2014, vol. 119.
  • Voicescu M., Cyber terrorism and bioterrorism – new forms of terrorists action. size, effects and countermeasures, International Scientific Conference „Strategies XXI” 2012, vol. 3.

Message to:

 

 

© 2017 Adam Marszałek Publishing House. All rights reserved.

Projekt i wykonanie Pollyart