O'Reilly logo

Strategic Intelligence Management by Simeon Yates, Babak Akhgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 20

Cyber Security Countermeasures to Combat Cyber Terrorism

Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick and Dimitrios Frangiskatos

Introduction

Any piece of work that seeks to discuss cyber terrorism must necessarily start with some definitions and descriptions to aid the reader to both differentiate and contextualize cyber terrorism from other areas of cyber security, such as cybercrime, malicious hacking, cyber fraud, and the numerous different types of system breaches, failures, and human error.

Most contemporary definitions of cyber terrorism focus on the following three aspects:

1. The motivation of the perpetrator(s)

2. The targeted cyber system

3. The impact on an identified population.

For example, the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required