Cargando…

Responses to Cyber Terrorism.

The one issue touched on repeatedly by the contributors of this publication is the difficulty of arriving at a definition of cyber terrorism. A NATO Office of Security document cautiously defines it as "a cyber attack using or exploiting computer or communication networks to cause sufficient de...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Turkey, Center of Excellence - Defence Against Terrorism Ankara
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : IOS Press, 2008.
Colección:NATO security through science series. Human and societal dynamics ; v. 34.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn437202848
003 OCoLC
005 20240329122006.0
006 m o d
007 cr mn|---|||||
008 090817s2008 ne ob 001 0 eng d
040 |a MERUC  |b eng  |e pn  |c MERUC  |d EBLCP  |d OCLCQ  |d YDXCP  |d DEBSZ  |d OCLCQ  |d AGLDB  |d OCLCO  |d OTZ  |d ZCU  |d MERUC  |d OCLCQ  |d OCLCO  |d U3W  |d STF  |d ICG  |d INT  |d OCLCQ  |d TKN  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 476140672 
020 |a 9781433711398  |q (electronic bk.) 
020 |a 1433711397  |q (electronic bk.) 
020 |a 9781607503118 
020 |a 1607503115 
020 |z 9781586038366  |q (hardcover) 
029 1 |a AU@  |b 000047155665 
029 1 |a AU@  |b 000048966411 
029 1 |a DEBBG  |b BV044128754 
029 1 |a DEBSZ  |b 430470967 
035 |a (OCoLC)437202848  |z (OCoLC)476140672 
037 |a 978-1-58603-836-6  |b IOS Press  |n http://www.iospress.nl 
050 4 |a HV6773.R47 2008 
072 7 |a COM  |x SOC000000  |2 bisacsh 
072 7 |a BUS  |x 032000  |2 bisacsh 
072 7 |a SOC  |x 000000  |2 bisacsh 
082 0 4 |a 303.625 
049 |a UAMI 
100 1 |a Turkey, Center of Excellence - Defence Against Terrorism Ankara. 
245 1 0 |a Responses to Cyber Terrorism. 
260 |a Amsterdam :  |b IOS Press,  |c 2008. 
300 |a 1 online resource (164 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a NATO security through science series. E, Human and societal dynamics,  |x 1874-6276 ;  |v v. 34 
505 0 |a Title page; Preface; Contents; The History of the Internet: The Interwoven Domain of Enabling Technologies and Cultural Interaction; Institutionalization of a Web-Focused, Multinational Counter-Terrorism Campaign -- Building a Collective Open Source Intelligent System; Critical Information Infrastructure Protection; Use of the Internet by Terrorists; WWW.AL-QAEDA: The Reliance of al-Qaeda on the Internet; Cyberterrorism and International Cooperation: General Overview of the Available Mechanisms to Facilitate an Overwhelming Task. 
505 8 |a Legal and Policy Evaluation: International Coordination of Prosecution and Prevention of Cyber TerrorismThe Internet as a Tool for Intelligence and Counter-Terrorism; NATO and Cyber Terrorism; Analysis of PKK/KONGRA-GEL Websites to Identify Points of Vulnerability; Summary of the Working Group Discussions; Author Index. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
520 |a The one issue touched on repeatedly by the contributors of this publication is the difficulty of arriving at a definition of cyber terrorism. A NATO Office of Security document cautiously defines it as "a cyber attack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal." But the cyber world is surely remote from what is recognized as terrorism: the bloody attacks and ethnic conflicts, or, more precisely, the politically-motivated "intention to cause death or serious bodily harm to civilians or non-combatants with the purpose of intimidating a population or compelling a government ..." (UN report, "Freedom from Fear", 2005). It is hard to think of an instance when computer code has physically harmed anyone. Yet a number of contributors show that exactly such events, potentially on a huge scale, can be expected. For example attacks on critical infrastructure, in particular on SCADA (Supervisory Control and Data Acquisition) systems which control physical processes in places like chemical factories, dams and power stations. A part of the publication examines cyber terrorism in the proper sense of the term and how to respond in terms of technology, awareness, and legal/political measures. However, there is also the related question of responding to the terrorist presence on the Internet (so-called 'terrorist contents'). Here the Internet is not a weapon, but an important tool for terrorists' communications (coordination, training, recruiting), and information gathering on the targets of planned attacks. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Cyberterrorism  |x Prevention  |v Congresses. 
650 7 |a Cyberterrorism  |x Prevention  |2 fast 
655 7 |a Conference papers and proceedings  |2 fast 
758 |i has work:  |a Responses to Cyber Terrorism (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCY4v6wkfgBch4VBRqw6p6C  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 1 |z 9781586038366 
830 0 |a NATO security through science series.  |n E,  |p Human and societal dynamics ;  |v v. 34. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=334204  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL334204 
938 |a YBP Library Services  |b YANK  |n 2796527 
994 |a 92  |b IZTAP