2017
DOI: 10.21275/art20163936
|View full text |Cite
|
Sign up to set email alerts
|

Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review

Abstract: This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
(11 reference statements)
0
2
0
Order By: Relevance
“…The attacker attempts to hack multiple devices and systems, regardless of their identities, in order to profit financially from the information obtained [28]. In addition, an attacker can set up his own node or compromise one of the current ones [29].…”
Section: B Compromisingmentioning
confidence: 99%
See 1 more Smart Citation
“…The attacker attempts to hack multiple devices and systems, regardless of their identities, in order to profit financially from the information obtained [28]. In addition, an attacker can set up his own node or compromise one of the current ones [29].…”
Section: B Compromisingmentioning
confidence: 99%
“…The malicious software will then scan the smart home infrastructure and probe IoT devices to find system flaws and produce a cyber map of the network's topography. This stage is simple to complete with the help of online tools [28]. Real-time and autonomous interaction between devices make discovering and identifying the compromised nodes very difficult [30].…”
Section: B Compromisingmentioning
confidence: 99%