Difference between revisions of "Cyber Terrorism"
Line 34: | Line 34: | ||
{{definition|The exploitation of digital infrastructures for terrorist ends, it comprises of politically-motivated hacking operations designed to cause grave harm such as loss of life or severe economic [[damage]]. <ref>[http://phcybersecurity.blogspot.nl/2011/09/philippine-national-cyber-security-plan.html National Cyber Security Plan ]</ref>}}<br />An example would be an intrusion into an air traffic control system and causing two planes to collide. | {{definition|The exploitation of digital infrastructures for terrorist ends, it comprises of politically-motivated hacking operations designed to cause grave harm such as loss of life or severe economic [[damage]]. <ref>[http://phcybersecurity.blogspot.nl/2011/09/philippine-national-cyber-security-plan.html National Cyber Security Plan ]</ref>}}<br />An example would be an intrusion into an air traffic control system and causing two planes to collide. | ||
==== Poland ==== | ==== Poland ==== | ||
− | {{definition|Cyberterrorism is an offence of a terrorist nature committed in cyberspace. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/copy_of_PO_NCSS.pdf CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND, 2013]</ref>}} | + | {{definition|Cyberterrorism is an offence of a terrorist nature committed in cyberspace. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/copy_of_PO_NCSS.pdf CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND, 2013]</ref>}}<br /> |
− | <br /> | + | ==== Portugal ==== |
+ | {{definition|Ciberterrorismo, onde se procura um impacto social e político significativo pela destruição física. Neste contexto, as infraestruturas críticas constituem os alvos de ataque mais prováveis. <ref>[http://www.idn.gov.pt/publicacoes/cadernos/idncaderno_12.pdf Estratégia da Informação e Segurança no Ciberespaço, Instituto da Defesa Nacional Portugal (2013)]</ref>}}<br /> | ||
==== South Africa ==== | ==== South Africa ==== | ||
− | {{definition|Cyber Terrorism means use of internet-based attacks in terrorist activities by individuals or groups, including the act of deliberate large scale disruptions of computer networks, especially computers attached to the internet, by the means of tools such as computer viruses. <ref>[http://pmg-assets.s3-website-eu-west-1.amazonaws.com/docs/100219cybersecurity.pdf South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010]</ref>}} | + | {{definition|Cyber Terrorism means use of internet-based attacks in terrorist activities by individuals or groups, including the act of deliberate large scale disruptions of computer networks, especially computers attached to the internet, by the means of tools such as computer viruses. <ref>[http://pmg-assets.s3-website-eu-west-1.amazonaws.com/docs/100219cybersecurity.pdf South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010]</ref>}}<br /> |
− | <br /> | ||
==== United States ==== | ==== United States ==== | ||
=====FBI (2007) ===== | =====FBI (2007) ===== | ||
Line 61: | Line 61: | ||
[[Category:Threat]][[Category:Risk]] | [[Category:Threat]][[Category:Risk]] | ||
− | {{#set:defined by=Austria|defined by=Colombia|defined by=Montenegro|defined by=Philippines|defined by=Poland|defined by=South Africa|defined by=United States|defined by=Russian Federation}} | + | {{#set:defined by=Austria|defined by=Colombia|defined by=Montenegro|defined by=Philippines|defined by=Poland|defined by=Portugal|defined by=South Africa|defined by=United States|defined by=Russian Federation}} |
Revision as of 16:50, 28 June 2015
The term cyber terror appeared for the first time in the mid-eighties of the previous century. Since then the notion has been misused a number of times by journalists and politicians. It does not help that a clear definition is missing as is debated in [1]:
"The use, making preparations for, or threat of action designed to cause a social order change, to create a climate of fear or intimidation amongst (part of) the general public, or to influence political decision-making by the government or an international governmental organisation; made for the purposes of advancing a political, religious, racial or ideological cause; by affecting the integrity, confidentiality, and/or availability of information, information systems and networks, or by unauthorised actions affecting information and communication technology-based control of real-world physical processes; and it involves or causes:
- violence to, suffering of, serious injuries to, or the death of (a) persons(s),
- serious damage to a property,
- a serious risk to the health and safety of the public,
- a serious economic loss,
- a serious breach of ecological safety,
- a serious breach of the social and political stability and cohesion of a nation.”
Contents
Definitions
National Definitions
Austria
These acts constitute organised cyber sabotage (attacks) caused by political-fundamentalist groups or individual perpetrators; they are directed against states, organisations or enterprises.
Colombia
Cyber Terrorism is the convergence of terrorism and cyber attack to computers, networks and information stored in them, including violence against persons or
properties, or at least generates fear (derived from Dorothy Denning).
Montenegro
Cyber terrorism is a criminal act in cyberspace that aims to intimidate governments or their citizens, with the aim to achieve political goals. [5]
Philippines
An example would be an intrusion into an air traffic control system and causing two planes to collide.
Poland
Portugal
South Africa
United States
FBI (2007)
.
Other International Definitions
East-West Institute (Russia-US)
Кибертерроризм: использование киберпространства, террористических целях, которые определяются в качестве таковых национальным или международным законодательством. [11]
See also
Notes
- ↑ Luiijf, H.A.M., “Definitions of Cyber Terrorism” in: Akhgar, B., Staniforth, A., Bosco, F. (eds) Cyber Crime and Cyber Terrorism Investigator’s Handbook, Elseviers 2014, chapter 2, p. 11-18
- ↑ Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
- ↑ Conpes 3510
- ↑ Strategija o bezbjednosti 2013-2017 (2012)
- ↑ NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
- ↑ National Cyber Security Plan
- ↑ CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND, 2013
- ↑ Estratégia da Informação e Segurança no Ciberespaço, Instituto da Defesa Nacional Portugal (2013)
- ↑ South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010
- ↑ [1]Hearing on cyber terrorism
- ↑ RUSSIA-‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS