Page 48 - CDM-Cyber-Warnings-March-2014
P. 48
-#$123 -#(-& -# .,! 3(-& < 8!$1 $11.1(2,= 3 -3$1- 3(.- + $5$+ Milica Djekic, an Online Marketing Coordinator at Dejan SEO and the Editor-in-Chief at Australian Science Magazine War, crime and terrorism! The traditional concepts that happen in a physical domain. The only new is the “cyber” domain. In this digital age, the concept of the use of cyberspace to carry out terrorist activities has emerged. The fast evolution of information and communication technologies brings up the question, “How can security of cyberspace be ensured?”. IT and critical infrastructure networks can be accessed from anywhere in the world. These infrastructures have little to none cyber protection. In this context, it is strategically important that nations prepare for a possible cyber attack on IT and critical infrastructure. What is the “Cyber Terrorism”? By many, cyber terrorism is the use of Internet based attacks in terrorist activities. This include the acts of deliberate, large-scale disruption of computer networks, by the means of tools such as computer viruses and similar malicious software. The term by itself is quite controversial. Some authors choose a very narrow definition of cyber terrorism, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. On the other hand, cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological. The “Cyber Terrorism” Concept The major components of cyber terrorism form the concept of cyber terrorism. Basically, if one or more components are not provided, it would not constitute cyber terrorism. Here are the fundamental components of cyber terrorism: (1) Target Cyber terrorism is designed to foment terror or demoralization among a target population. It is the use of computer networks in order to harm human life or to sabotage critical national infrastructure in a way that may cause harm to human life. With the increasing interconnectedness of critical infrastructures on Information and Communication Technology (ICT), the selection of a target that allows the maximum level of disruption would significantly influence the terrorists. Motivation In general, terrorists have multiple motives for attacking targets. Cyber terrorism is associated with political, ideological and social motivation. Regarding that, terrorists are psychologically motivated to drive terrorism. It is crucially important to understand the motive of every crime. From the motivation perspective, cyber terrorism exists if the person or group of people " # % " $ " # ! !