WAYS OF CYBERTERRORISM Cover Image

WAYS OF CYBERTERRORISM
WAYS OF CYBERTERRORISM

Author(s): Sorin Topor
Subject(s): Military policy
Published by: Carol I National Defence University Publishing House
Keywords: terrorism; cyber terrorism; cyber spying; cyber frauds; e-propaganda; e-training; radicalization;

Summary/Abstract: Cyberattacks are now becoming more and more complex, more frequent and with increasingly destructive effects.Regardless of the type or value of an organization, it affects information of public and private infrastructures. Moreover, thetarget may be the private information of those who hold, even temporarily, various public or official positions in a state. Inother words, cyberattacks can be directed towards the information profile of a target by affecting data about identity, aboutfinance, by changing information from personal conversations and other private life activities etc.In this context, terrorism aims to perform actions with clear goals, only once or in series, having as motivation theresistance to political, economic or social changes and producing global information effects. It is well known that thedevelopment of terrorism is favored by the development of information technology. Through these, terrorist organizationsseek to enhance the perception of terror, by capturing the attention of the global media and by transmitting apocalypticmessages. On the other hand, the anti-terrorist structures are trying to stop or at least hold under certain control thesedirections of evolution.The purpose of this article is to determine the content of the concept of cyber terrorism, starting from the analysis of themain factors of public insecurity and social disorder that facilitate the development of modern forms of terrorism. In orderto do so, we will try to underline the essential aspects that are relevant for understanding the forms it takes and the ways itworks.

  • Issue Year: 2019
  • Issue No: 03
  • Page Range: 82-90
  • Page Count: 9
  • Language: English
Toggle Accessibility Mode