Difference between revisions of "Cyber Terrorism"
Line 4: | Line 4: | ||
<!--=== European Definitions === | <!--=== European Definitions === | ||
− | |||
=== Other International Definitions ===--> | === Other International Definitions ===--> | ||
=== National Definitions === | === National Definitions === | ||
Line 28: | Line 27: | ||
==== United States ==== | ==== United States ==== | ||
=====FBI (2007) ===== | =====FBI (2007) ===== | ||
− | {{definition|A criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services, where the intended purpose is to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social or ideological agenda. <ref>[http://www.fbi.gov/news/testimony/hearing-on-cyber-terrorism]Hearing on cyber terrorism</ref>}}. | + | {{definition|A criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services, where the intended purpose is to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social or ideological agenda. <ref>[http://www.fbi.gov/news/testimony/hearing-on-cyber-terrorism]Hearing on cyber terrorism</ref>}}.<br /> |
+ | |||
+ | === Other International Definitions === | ||
+ | ====East-West Institute - US - Russia ==== | ||
+ | {{definition|Cyber Terrorism is the use of cyberspace for terrorist purposes as defined by national or international law.<br />Кибертерроризм: использование киберпространства, террористических целях, которые определяются в качестве таковых национальным или международным законодательством. <ref>[http://mercury.ethz.ch/serviceengine/Files/ISN/130080/ipublicationdocument_singledocument/a7cc9f14-4518-42cc-b770-f302a555e178/en/Russia-U+S++bilateral+on+terminology+v76+%282%29-1.pdf RUSSIA-‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS]</ref>}} | ||
<!--===Standard Definition===--> | <!--===Standard Definition===--> | ||
Line 43: | Line 46: | ||
[[Category:Threat]][[Category:Risk]] | [[Category:Threat]][[Category:Risk]] | ||
− | {{#set:defined by=Austria|defined by=Colombia|defined by=Montenegro|defined by=Philippines|defined by=Poland|defined by=United States}} | + | {{#set:defined by=Austria|defined by=Colombia|defined by=Montenegro|defined by=Philippines|defined by=Poland|defined by=United States|defined by=Russian Federation}} |
Revision as of 02:05, 22 June 2015
The term cyber terror appeared for the first time in the mid-eighties of the previous century. Since then the notion has been misused a number of times by journalists and politicians. It does not help that a clear definition is missing as is debated in [1]
Contents
Definitions
National Definitions
Austria
These acts constitute organised cyber sabotage (attacks) caused by political-fundamentalist groups or individual perpetrators; they are directed against states, organisations or enterprises.
Colombia
Cyber Terrorism is the convergence of terrorism and cyber attack to computers, networks and information stored in them, including violence against persons or
properties, or at least generates fear (derived from Dorothy Denning).
Montenegro
Cyber terrorism is a criminal act in cyberspace that aims to intimidate governments or their citizens, with the aim to achieve political goals. [5]
Philippines
An example would be an intrusion into an air traffic control system and causing two planes to collide.
Poland
United States
FBI (2007)
.
Other International Definitions
East-West Institute - US - Russia
Кибертерроризм: использование киберпространства, террористических целях, которые определяются в качестве таковых национальным или международным законодательством. [9]
See also
Notes
- ↑ Luiijf, H.A.M., “Definitions of Cyber Terrorism” in: Akhgar, B., Staniforth, A., Bosco, F. (eds) Cyber Crime and Cyber Terrorism Investigator’s Handbook, Elseviers 2014, chapter 2, p. 11-18
- ↑ Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
- ↑ Conpes 3510
- ↑ Strategija o bezbjednosti 2013-2017 (2012)
- ↑ NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
- ↑ National Cyber Security Plan
- ↑ CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND, 2013
- ↑ [1]Hearing on cyber terrorism
- ↑ RUSSIA-‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS