Rethinking the threat of cyberterrorism

11Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Chapter Overview: Cyberterrorism is a mongrel concept. Different notions of cyberterrorism, and the kinds of operations that can occur in the cyber domain, give rise to different types of policy problems. This stems from a general problem found in broader discussions of cyber conflict, which are founded on persistent myths regarding the vulnerabilities, threat actors, nature of conflict, and the domain itself. This chapter begins with a non-technical overview of cyberspace aiming to clarify the technological realities underlying the domain by focusing on the difference between Information and Communications Technology (ICT) and industrial control systems (ICS). The paper refines the contextual environments of cyber events to expose the seams between the kinds of operations a terrorist organization may conduct in cyberspace. A range of cyber operations across a spectrum of conflict affects illustrates the variance in the terrorist misuse of cyber. Each contextual environment presents different challenges for national security.

Cite

CITATION STYLE

APA

Yannakogeorgos, P. A. (2014). Rethinking the threat of cyberterrorism. In Cyberterrorism: Understanding, Assessment, and Response (Vol. 9781493909629, pp. 43–62). Springer New York. https://doi.org/10.1007/978-1-4939-0962-9_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free