Cyber Terrorism

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Matthew Warren - One of the best experts on this subject based on the ideXlab platform.

  • safeguarding australia from Cyber Terrorism a scada risk framework
    Strategic and practical approaches for information security governance, 2012
    Co-Authors: Christopher Beggs, Matthew Warren
    Abstract:

    Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the Cyber-arena to coordinate Cyber-based attacks. This chapter identifies that Cyber-Terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing Cyber-Terrorism risk assessment models for SCADA systems. This chapter examines a Cyber-Terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of Cyber-Terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.

  • safeguarding australia from Cyber Terrorism a proposed Cyber Terrorism scada risk framework for industry adoption
    Proceedings of the 10th Australian Information Warfare and Security Conference, 2009
    Co-Authors: Christopher Beggs, Matthew Warren
    Abstract:

    Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the Cyber-arena to  coordinate Cyber-based attacks. This paper identifies that Cyber-Terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing Cyber-Terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a Cyber-Terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of Cyber-Terrorism within Australia. The findings and results of an industry focus group is presented in support of the developed framework for SCADA industry adoption and acceptance.

  • safeguarding australia from Cyber Terrorism a proposed Cyber Terrorism scada risk framework for industry adoption
    Journal of information warfare, 2009
    Co-Authors: Christopher Beggs, Matthew Warren
    Abstract:

    Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the Cyber-arena to coordinate Cyber-based attacks. This paper identifies that Cyber-Terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing Cyber-Terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a Cyber-Terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of Cyber-Terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry adoption and acceptance.

  • special feature computer hacking and Cyber Terrorism the real threats in the new millennium
    Computers & Security, 1999
    Co-Authors: Steven Furnell, Matthew Warren
    Abstract:

    As the new millennium approaches, we are living in a society that is increasingly dependent upon information technology. However, whilst technology can deliver a number of benefits, it also introduces new vulnerabilities that can be exploited by persons with the necessary technical skills. Hackers represent a well-known threat in this respect and are responsible for a significant degree of disruption and damage to information systems. However, they are not the only criminal element that has to be taken into consideration. Evidence suggests that technology is increasingly seen as potential tool for terrorist organizations. This is leading to the emergence of a new threat in the form of 'Cyber terrorists', who attack technological infrastructures such as the Internet in order to help further their cause. The paper discusses the problems posed by these groups and considers the nature of the responses necessary to preserve the future security of our society.

Zahri Yunos - One of the best experts on this subject based on the ideXlab platform.

  • a qualitative analysis for evaluating a Cyber Terrorism framework in malaysia
    Information Security Journal: A Global Perspective, 2015
    Co-Authors: Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri
    Abstract:

    Terrorist Cyber attacks on Critical National Information Infrastructure are possible where motives, resources, and willingness to conduct operations against specific targets influence people to conduct such actions. However, there is no universally accepted definition of Cyber Terrorism, which seems to be a fundamental challenge in countering Cyber Terrorism threats. A schematic study has been conducted to discover various definitions of related terms used in this area. Although many policy makers and scholars have studied and provided the concept of Cyber Terrorism, some of the definitions are static and some are fragmented. Thus, in this research components that constitute Cyber Terrorism are explored, and the study is supported by systematic validation and an appropriate evaluation mechanism for the proposed components. The introduction of this paper indicates that the nature of Cyber Terrorism should be formulated from six perspectives: motivation, target, tools of attack, domain, method of action, and impact. According to our observations, there are both similarities and differences in views regarding the proposed Cyber Terrorism conceptual framework.

  • Evaluating Cyber Terrorism components in Malaysia
    The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 2014
    Co-Authors: Zahri Yunos, Rabiah Ahmad
    Abstract:

    In this digital age, the use of Cyberspace to carry out terrorist activities has emerged. To date, there is no universally accepted definition of Cyber Terrorism, which seems to be the fundamental issue and challenge in countering Cyber Terrorism threats. Some argued that the concept should be parallel with domestic political, cultural and social context. The purpose of this paper is to develop components of Cyber Terrorism using qualitative method analysis. In this paper, a semi-structured interview with purposive sampling for data collection has been carried out. The analysis indicated that the framework describing Cyber Terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact. The analysis has also shown that there were some similarities and differences in views regarding the proposed Cyber Terrorism conceptual framework.

  • the application of qualitative method in developing a Cyber Terrorism framework
    2014
    Co-Authors: Zahri Yunos, Rabiah Ahmad
    Abstract:

    A qualitative method research has become an increasingly popular approach in the discipline of social science. The purpose of this paper is to describe the application of qualitative method in developing a Cyber Terrorism framework. The primary goal of this research is to discover the theory and then develop a conceptual framework that describes the phenomena. In this research, a semi- structured interview with purposive sampling procedures for data collection was used. The analysis indicated that the framework describing Cyber Terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact.

  • perception on Cyber Terrorism a focus group discussion approach
    Journal of Information Security, 2012
    Co-Authors: Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff
    Abstract:

    Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the Cyber Terrorism conceptual framework through the analysis of focus group discussion. The proposed Cyber Terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed Cyber Terrorism framework is acceptable by the participants. The present study supports our initial research that the Cyber Terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact.

  • understanding Cyber Terrorism the grounded theory method applied
    Proceedings Title: 2012 International Conference on Cyber Security Cyber Warfare and Digital Forensic (CyberSec), 2012
    Co-Authors: Rabiah Ahmad, Zahri Yunos, Shahrin Sahib
    Abstract:

    Grounded theory method is gaining importance as a method for theory building about a particular phenomenon. One of the most important benefits is the ability to derive theory from and within the context of data collected. In this research, the authors analyzed the data by using a grounded theory method, in which the Cyber Terrorism framework is drawn. This paper proposes a conceptual framework describing the components of Cyber Terrorism from six perspectives: Target, motivation, tools of attack, domain, method of action, and impact. The framework provides a baseline when establishing and defining the concept of Cyber Terrorism. The finding of this work contributes as strategic input to the policy and decision makers in formulating and developing better policy and strategy to counter Cyber Terrorism.

Rabiah Ahmad - One of the best experts on this subject based on the ideXlab platform.

  • a qualitative analysis for evaluating a Cyber Terrorism framework in malaysia
    Information Security Journal: A Global Perspective, 2015
    Co-Authors: Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri
    Abstract:

    Terrorist Cyber attacks on Critical National Information Infrastructure are possible where motives, resources, and willingness to conduct operations against specific targets influence people to conduct such actions. However, there is no universally accepted definition of Cyber Terrorism, which seems to be a fundamental challenge in countering Cyber Terrorism threats. A schematic study has been conducted to discover various definitions of related terms used in this area. Although many policy makers and scholars have studied and provided the concept of Cyber Terrorism, some of the definitions are static and some are fragmented. Thus, in this research components that constitute Cyber Terrorism are explored, and the study is supported by systematic validation and an appropriate evaluation mechanism for the proposed components. The introduction of this paper indicates that the nature of Cyber Terrorism should be formulated from six perspectives: motivation, target, tools of attack, domain, method of action, and impact. According to our observations, there are both similarities and differences in views regarding the proposed Cyber Terrorism conceptual framework.

  • Evaluating Cyber Terrorism components in Malaysia
    The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 2014
    Co-Authors: Zahri Yunos, Rabiah Ahmad
    Abstract:

    In this digital age, the use of Cyberspace to carry out terrorist activities has emerged. To date, there is no universally accepted definition of Cyber Terrorism, which seems to be the fundamental issue and challenge in countering Cyber Terrorism threats. Some argued that the concept should be parallel with domestic political, cultural and social context. The purpose of this paper is to develop components of Cyber Terrorism using qualitative method analysis. In this paper, a semi-structured interview with purposive sampling for data collection has been carried out. The analysis indicated that the framework describing Cyber Terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact. The analysis has also shown that there were some similarities and differences in views regarding the proposed Cyber Terrorism conceptual framework.

  • the application of qualitative method in developing a Cyber Terrorism framework
    2014
    Co-Authors: Zahri Yunos, Rabiah Ahmad
    Abstract:

    A qualitative method research has become an increasingly popular approach in the discipline of social science. The purpose of this paper is to describe the application of qualitative method in developing a Cyber Terrorism framework. The primary goal of this research is to discover the theory and then develop a conceptual framework that describes the phenomena. In this research, a semi- structured interview with purposive sampling procedures for data collection was used. The analysis indicated that the framework describing Cyber Terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact.

  • perception on Cyber Terrorism a focus group discussion approach
    Journal of Information Security, 2012
    Co-Authors: Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff
    Abstract:

    Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the Cyber Terrorism conceptual framework through the analysis of focus group discussion. The proposed Cyber Terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed Cyber Terrorism framework is acceptable by the participants. The present study supports our initial research that the Cyber Terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact.

  • the application of mixed method in developing a Cyber Terrorism framework
    Journal of Information Security, 2012
    Co-Authors: Rabiah Ahmad, Zahari Yunos
    Abstract:

    Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a Cyber Terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution.

Christopher Beggs - One of the best experts on this subject based on the ideXlab platform.

  • safeguarding australia from Cyber Terrorism a scada risk framework
    Strategic and practical approaches for information security governance, 2012
    Co-Authors: Christopher Beggs, Matthew Warren
    Abstract:

    Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the Cyber-arena to coordinate Cyber-based attacks. This chapter identifies that Cyber-Terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing Cyber-Terrorism risk assessment models for SCADA systems. This chapter examines a Cyber-Terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of Cyber-Terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.

  • safeguarding australia from Cyber Terrorism a proposed Cyber Terrorism scada risk framework for industry adoption
    Proceedings of the 10th Australian Information Warfare and Security Conference, 2009
    Co-Authors: Christopher Beggs, Matthew Warren
    Abstract:

    Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the Cyber-arena to  coordinate Cyber-based attacks. This paper identifies that Cyber-Terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing Cyber-Terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a Cyber-Terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of Cyber-Terrorism within Australia. The findings and results of an industry focus group is presented in support of the developed framework for SCADA industry adoption and acceptance.

  • safeguarding australia from Cyber Terrorism a proposed Cyber Terrorism scada risk framework for industry adoption
    Journal of information warfare, 2009
    Co-Authors: Christopher Beggs, Matthew Warren
    Abstract:

    Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the Cyber-arena to coordinate Cyber-based attacks. This paper identifies that Cyber-Terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing Cyber-Terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a Cyber-Terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of Cyber-Terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry adoption and acceptance.

  • developing new strategies to combat Cyber Terrorism
    Information Resources Management Association International Conference (IRMA), 2004
    Co-Authors: Christopher Beggs, Matthew Butler
    Abstract:

    Terrorism is no longer a concern for only a religious or ethnic few. It is now a very real threat to the entire global community. A major factor in this widespread concern is the recent emergence of technologically based terrorist activity, or Cyber-Terrorism. This study provides a brief history of Cyber-Terrorism, along with discussion of this new threat. Contemporary security measures are discussed, acknowledging fundamental flaws not only in these technologies, but in overall strategies being used. This will form the basis for the major focus of this research: a suggested nine point security plan, aimed at developing new strategies in the fight against Cyber-Terrorism.

G. Manimaran - One of the best experts on this subject based on the ideXlab platform.

  • Internet infrastructure security: a taxonomy
    IEEE Network, 2002
    Co-Authors: A. Chakrabarti, G. Manimaran
    Abstract:

    The pervasive and ubiquitous nature of the Internet coupled with growing concerns about Cyber Terrorism demand immediate solutions for securing the Internet infrastructure. So far, the research in Internet security primarily focused on. securing the information rather than securing the infrastructure itself. Given the prevailing threat situation, there is a compelling need to develop architectures, algorithms, and protocols to realize a dependable Internet infrastructure. In order to achieve this goal, the first and foremost step is to develop a comprehensive understanding of the security threats and existing solutions. This article attempts to fulfill this important step by providing a taxonomy of security attacks, which are classified into four main categories: DNS hacking, routing table poisoning, packet mistreatment, and denial-of-service attacks. The article discusses the existing solutions for each of these categories, and also outlines a methodology for developing secure protocols.