• Home
  • Law
  • 3GE Collection on Law: Cyber Warfare & Terrorism

Law

3GE Collection on Law: Cyber Warfare & Terrorism

3GE Collection on Law: Cyber Warfare & Terrorism

  • ISBN
  • Price
  • Publication Year
  • Publisher
  • Binding
  • Description
  • About the Editor
    • Provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments.
    • The present book finds its comprehensive treatment about the cyber war and its increasing use by the terrorists of different nature across the world in a very lucid way.
    • Addresses the issues of fighting cybercrime and evaluates measures undertaken by various governments to prevent these attacks from happening.

The use of technology has squeezed society as well. Due to automation technologies, organizational processes are becoming similar around the world. Governments are sharing information and supporting legal frameworks to take advantage of these synergies. Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic mechanics of these attacks is usually through the use of explosives detonated remotely or by a suicidal person intent on taking others with them into the next life. Cyberfears have, however, been exaggerated. Cyberattacks on critical components of the national infrastructure are not uncommon, but they have not been conducted by terrorists and have not sought to inflict the kind of damage that would qualify as cyberterrorism. Terrorist use of the Internet is common, even though cyber terrorism is rare. The Internet provides an almost perfect tool for enabling the goals of many terrorist organizations. The threat posed by cyberterrorism has grabbed the attention of the mass media, the security community, and the information technology (IT) industry. Journalists, politicians, and experts in a variety of fields have popularized a scenario in which sophisticated cyberterrorists electronically break into computers that control dams or air traffic control systems, wreaking havoc and endangering not only millions of lives but national security itself. And yet, despite all the gloomy predictions of a cyber-generated doomsday, no single instance of real cyberterrorism has been recorded.
This book entitled “Cyber Warfare & Terrorism” gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century, providing a framework for assessing the risks of cyber terrorism. It uses this framework to develop a good understanding of the factors that terrorists must consider when deciding whether to pursue cyber-based attacks. It also facilitates a general assessment of the overall risks posed by cyber terrorists, today and in the next few years. All modern activities seem to blend the use of technology, organization and humans. This also applies to cyber warfare and cyber terrorism. The human aspect of information technology is extremely important. The simplest method of breaking into a system is not to use a sophisticated computer application but instead influence the owner of a password to reveal it. The use of distributed denial of service (DDoS) attacks has become a widespread method of achieving political ends through the disruption of online services. In these types of attacks, a server is overwhelmed with Internet traffic so access to a particular website is degraded or denied. The advent of the Stuxnet worm, which some consider the first cyberweapon, showed that cyberattacks may have a more destructive and lasting effect. In this book, we analyze key antispam approaches, including filtering, remailers, e-postage, hashcash, and sender authentication, and we discuss how antispam approaches can be used against information warfare and cyber terrorism. Furthermore, we analyze vulnerabilities in each approach and recommend possible countermeasures. The book examines how terrorists are using the Internet to thrive in the modern world.