The article is devoted to the concept of "cyberterrorism", which originates in the recent past and it is derived from the broader general concept of "terrorism" and defines a global threat to information security. The article also explains how cyberterrorism interferes with the normal functioning of institutions and public authorities. Actually, based on all the above, it can be noted that cyberterrorism is a very complex and multifaceted phenomenon, which has a diverse structure, which complicates the development of methods to combat and prevent it. Modern society has yet to develop an effective system to counter and combat this information evil of today. Today, the issue of combating cyberterrorism remains open, because due to the novelty and incomplete understanding of the danger of the phenomenon, as well as the impossibility of developing a single definition, countries can not comprehensively protect themselves from cyberterrorist attacks. However, a number of issues remains open, including the lack of a legal single concept of "cyberterrorism" in most European countries and a system of clear mechanisms to combat cyberterrorism at the regional and national levels. Therefore, the urgency of this problem is very acute, as the latest technology allows terrorists to expand their activities. These issues require urgent solutions both domestically and globally. Effective international cooperation in the prevention and elimination of the consequences of cyber terrorism is essential.
Published in | International Journal of Science, Technology and Society (Volume 10, Issue 2) |
DOI | 10.11648/j.ijsts.20221002.11 |
Page(s) | 23-26 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Cyberattack, Cyberterrorism, Information Security, Modern Technologies
[1] | Hnatyuk SO Cyberterrorism: history of development, modern tendencies and countermeasures. Information security. 2013. T. 19, № 2. S. 118–129. |
[2] | Murphy Ian A. Captain Zap. Hack Story. URL: https://hackstory.net/Captain_Zap. |
[3] | Dubov D. Approaches to the formation of a thesaurus in the field of cybersecurity. Political management. 2010. № 4. S. 19–30. |
[4] | Barry C. Future of Cyberterrorism: The Physical and Virtual Worlds Converge. Crime and Justice International. 1997. Vol. 13. Issue 2. P. 15–18. URL: http://www.crime-research.org/library/Cyberter.htm. |
[5] | Cyberterrorism as a part of modern problems of national security. URL: www.nbuv.gov.ua/ejournals/FP/2010-2/10bovpnb.pdf (access date: 12.09.2020). |
[6] | Andrew Conry-Murray. Security policy in times of terror. URL: http://www.osp.ru/lan/2002/02/083.htm. |
[7] | Cyberterrorism and personal data protection. LLC SIDCON Consulting Company, 2013. URL: http://people2people.com.ua/nashi-novosti/105-kiber-terrorizm-zaschita-personalnyh-dannyh.html. |
[8] | Kapitonova EA Features of cyberterrorism as a new type of terrorist act. News of higher educational institutions. Volga region. Issue. 2 (34). 2015 - P. 29-41. |
[9] | Kostikhin AA The Internet as a tool of terrorist and extremist organizations in psychological warfare. URL: http://www.iimes.ru/?p=4737. |
[10] | Mazurov, VA Cyberterrorism: concept, problems of counteraction. TUSUR reports. - 2010. Issue. 1. pp. 41-45. |
[11] | Golubev VA Cyberterrorism as a new form of terrorism. Computer Crime Research Center URL: http://www.crime-research.org/library/Gol_tem3.htm. |
APA Style
Oleksandra Zinchenko. (2022). Cyberattacks as a Tool of Destructive Influence of Cyberterrorism. International Journal of Science, Technology and Society, 10(2), 23-26. https://doi.org/10.11648/j.ijsts.20221002.11
ACS Style
Oleksandra Zinchenko. Cyberattacks as a Tool of Destructive Influence of Cyberterrorism. Int. J. Sci. Technol. Soc. 2022, 10(2), 23-26. doi: 10.11648/j.ijsts.20221002.11
AMA Style
Oleksandra Zinchenko. Cyberattacks as a Tool of Destructive Influence of Cyberterrorism. Int J Sci Technol Soc. 2022;10(2):23-26. doi: 10.11648/j.ijsts.20221002.11
@article{10.11648/j.ijsts.20221002.11, author = {Oleksandra Zinchenko}, title = {Cyberattacks as a Tool of Destructive Influence of Cyberterrorism}, journal = {International Journal of Science, Technology and Society}, volume = {10}, number = {2}, pages = {23-26}, doi = {10.11648/j.ijsts.20221002.11}, url = {https://doi.org/10.11648/j.ijsts.20221002.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijsts.20221002.11}, abstract = {The article is devoted to the concept of "cyberterrorism", which originates in the recent past and it is derived from the broader general concept of "terrorism" and defines a global threat to information security. The article also explains how cyberterrorism interferes with the normal functioning of institutions and public authorities. Actually, based on all the above, it can be noted that cyberterrorism is a very complex and multifaceted phenomenon, which has a diverse structure, which complicates the development of methods to combat and prevent it. Modern society has yet to develop an effective system to counter and combat this information evil of today. Today, the issue of combating cyberterrorism remains open, because due to the novelty and incomplete understanding of the danger of the phenomenon, as well as the impossibility of developing a single definition, countries can not comprehensively protect themselves from cyberterrorist attacks. However, a number of issues remains open, including the lack of a legal single concept of "cyberterrorism" in most European countries and a system of clear mechanisms to combat cyberterrorism at the regional and national levels. Therefore, the urgency of this problem is very acute, as the latest technology allows terrorists to expand their activities. These issues require urgent solutions both domestically and globally. Effective international cooperation in the prevention and elimination of the consequences of cyber terrorism is essential.}, year = {2022} }
TY - JOUR T1 - Cyberattacks as a Tool of Destructive Influence of Cyberterrorism AU - Oleksandra Zinchenko Y1 - 2022/03/04 PY - 2022 N1 - https://doi.org/10.11648/j.ijsts.20221002.11 DO - 10.11648/j.ijsts.20221002.11 T2 - International Journal of Science, Technology and Society JF - International Journal of Science, Technology and Society JO - International Journal of Science, Technology and Society SP - 23 EP - 26 PB - Science Publishing Group SN - 2330-7420 UR - https://doi.org/10.11648/j.ijsts.20221002.11 AB - The article is devoted to the concept of "cyberterrorism", which originates in the recent past and it is derived from the broader general concept of "terrorism" and defines a global threat to information security. The article also explains how cyberterrorism interferes with the normal functioning of institutions and public authorities. Actually, based on all the above, it can be noted that cyberterrorism is a very complex and multifaceted phenomenon, which has a diverse structure, which complicates the development of methods to combat and prevent it. Modern society has yet to develop an effective system to counter and combat this information evil of today. Today, the issue of combating cyberterrorism remains open, because due to the novelty and incomplete understanding of the danger of the phenomenon, as well as the impossibility of developing a single definition, countries can not comprehensively protect themselves from cyberterrorist attacks. However, a number of issues remains open, including the lack of a legal single concept of "cyberterrorism" in most European countries and a system of clear mechanisms to combat cyberterrorism at the regional and national levels. Therefore, the urgency of this problem is very acute, as the latest technology allows terrorists to expand their activities. These issues require urgent solutions both domestically and globally. Effective international cooperation in the prevention and elimination of the consequences of cyber terrorism is essential. VL - 10 IS - 2 ER -