Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies

@article{Mazari2016CyberTT,
  title={Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies},
  author={Ali Al Mazari and Ahmed H. Anjariny and Shakeel A. Habib and Emmanuel Nyakwende},
  journal={Int. J. Cyber Warf. Terror.},
  year={2016},
  volume={6},
  pages={1-12}
}
The aim of this paper is to identify common features in: the definition of cyber terrorism, cyber terrorism targets, cyber terrorism crimes and then develop effective mitigation strategies and countermeasures to tackle this phenomenon. Through rigorous analysis of literature covering academic articles and official reports, we develop cyber terrorism definition taxonomy which includes five elements: target, motive, means, effect and intention; cyber terrorism targets taxonomy identified from the… 
Halting Boko Haram / Islamic State's West Africa Province Propaganda in Cyberspace with Cybersecurity Technologies
  • S. O. Ogunlana
  • Political Science, Computer Science
    Journal of Strategic Security
  • 2019
TLDR
The key findings were that the new generation of terrorists who are more technological savvy are growing, cybersecurity technologies are effective, and bilateral/ multilateral cooperation is essential to combat the expansion of terrorism in cyberspace.
A COMPREHENSIVE CYBERSECURITY FRAMEWORK FOR AFGHANISTAN’S CYBERSPACE
  • Ahmad Nabi Ahmadi
  • Computer Science, Political Science
    International Journal of Engineering Applied Sciences and Technology
  • 2021
TLDR
A comprehensive cybersecurity framework is proposed for Afghanistan in order to protect and assure data, information and IT infrastructure security in cyberspace, enhance capacities to prevent and response to cyber threats, protect the nation from the risk and vulnerability, damage from modern cyber threats and incidents, and eventually establish and achieve a Safe – Secure and Resilient cyber space for the government, businesses and citizens of Afghanistan.
The Study of the Plight of Cyberterrorism and Its Way Out
TLDR
Two types of cyberterrorism attack are introduced: target oriented and tool oriented, which means terrorists directly attack networking device, while tool oriented is the activity making use of Internet tools.
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
TLDR
A systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in information warfare scenarios, and a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision- making in such scenarios.
SECURITY EVALUATION OF INDUSTRY 4.0: UNDERSTANDING INDUSTRY 4.0 ON THE BASIS OF CRIME, BIG DATA, INTERNET OF THING (IoT) AND CYBER PHYSICAL SYSTEMS
Dunya uzerinde isgucu maliyetlerinin artmasiyla birlikte uretim tesislerinin iscilik maliyeti dusuk olan ulkelere kaydirildigina gecmis zamanlarda hepimiz sahit olduk. Gunumuzde ozellikle, teknoloji
Countering Expansion and Organization of Terrorism in Cyberspace
TLDR
The key findings were that the new generation of terrorists who are more technological savvy are growing, cybersecurity technologies are effective and quicker tools, and bilateral/multilateral cooperation is essential to combat the expansion of terrorism in cyberspace.
Detection of Arabic Terrorism Keyword in Websites
TLDR
This proposed detection technique for cyberterrorist suspected activities in the websites by using Krill Herd and Simulated Annealing algorithms has produced 84.9% accuracy rate, which has outperformed with the benchmark work.
Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
TLDR
A systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed, showing that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware.
Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms
TLDR
Three new level of categorizations, including low, high, and interleave have been introduced in this paper to optimize the accuracy rate, which produced 73.01% accuracy rate for the interleave level; thus, outperforming the benchmark work.

References

SHOWING 1-10 OF 18 REFERENCES
Safeguarding Australia from Cyber-terrorism: A proposed cyber-terrorism SCADA Risk Framework for Industry Adoption
TLDR
A managerial framework is proposed which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia and is an extension of work previously published by Beggs and Warren 2008.
CYBER TERRORISM ATTACK OF THE CONTEMPORARY INFORMATION TECHNOLOGY AGE: ISSUES, CONSEQUENCES AND PANACEA
TLDR
This study critically explores contemporary literatures of this topical issue of information technology aided terrorism (cyber terrorism) and suggests the possible panaceas to tackle the problem of cyber terrorism so as to maximize the benefits attached to information technology (IT) and minimize the evil posed by the terrorists.
Understanding cyber terrorism: The grounded theory method applied
  • R. AhmadZahri YunosS. Shahrin
  • Computer Science
    Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
  • 2012
TLDR
This paper proposes a conceptual framework describing the components of cyber terrorism from six perspectives: Target, motivation, tools of attack, domain, method of action, and impact.
Defining and Deterring Cyber War
TLDR
The project concludes that cyber attack, under certain conditions, must be treated as an act of war, that deterrence works to dissuade cyber aggression, and provides recommendations to protect American national interests.
Cyberbullying: The Challenge to Define
TLDR
A clear distinction between direct and indirect cyberbullying is made and a model definition of cyberbullies is offered and lends insight into how the essential bullying elements have evolved and should apply in the authors' parallel cyber universe.
The Need for Effective Information Security Awareness
TLDR
The need for security awareness programs in schools, universities, governments, and private organizations in the Middle East is shown by presenting results of several security awareness studies conducted among students and professionals in UAE in 2010.
Al Qaeda and the Internet: The Danger of “Cyberplanning”
  • T. Thomas
  • Political Science
    The US Army War College Quarterly: Parameters
  • 2003
We can say with some certainty, al Qaeda loves the Internet. When the latter first appeared, it was hailed as an integrator of cultures and a medium for businesses, consumers, and governments to
Bullying, Cyberbullying, and Suicide
  • S. HindujaJustin W. Patchin
  • Psychology
    Archives of suicide research : official journal of the International Academy for Suicide Research
  • 2010
TLDR
Examining the extent to which a nontraditional form of peer aggression—cyberbullying—is also related to suicidal ideation among adolescents suggests that a suicide prevention and intervention component is essential within comprehensive bullying response programs implemented in schools.
DoD cyber technology policies to secure automated information systems
TLDR
The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.
The Future of National and International Security on the Internet
TLDR
Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
...
...