IJATCA solicits original research papers for the August – 2024 Edition.
Last date of manuscript submission is August 30, 2024.
Cyberterrorism poses a significant and evolving threat in the digital age. Cyberterrorism has emerged as a grave concern in the contemporary world, with potential impacts on national security and global stability. This paper delves into the intricate realm of cyberterrorism, shedding light on its significance and consequences. By understanding the motivations and tactics employed by cyber terrorists, we can better comprehend the threats we face and develop strategies to safeguard against them. This review paper provides an in-depth analysis of cyberterrorism, including its historical background, motivations, tactics, and potential consequences. It explores the vulnerabilities of critical infrastructure, government systems, and financial institutions, prime targets for cyber terrorists. Additionally, the paper discusses the legal and ethical implications of countering cyberterrorism and provides insights into future trends and challenges. It concludes with recommendations for effective security measures to mitigate the risks associated with cyberterrorism.
S. W. Brenner, "Cybercrime, cyberterrorism and cyberwarfare," Revue Internationale de Droit Penal, vol. 77, no. 3, pp. 453-471, 2006, doi: 10.3917/ridp.773.0453.
E. H. Spafford, "The Internet Worm Program: An Analysis," 1988.
"Computer Hackers and Hacking: Exploring Those Lurking Behind The Screen." [Online]. Available: https://www.researchgate.net/publication/329877753
M. Kenney, "Cyber-Terrorism in a Post-Stuxnet World," Orbis, vol. 59, no. 1, pp. 111-128, 2015, doi: 10.1016/j.orbis.2014.11.009.
E. Ramdinmawii, S. Ghisingh, and U. M. Sharma, "A Study on the Cyber-Crime and Cyber Criminals: A Global Problem".
B. Halopeau, "Terrorist use of the internet," Cyber Crime and Cyber Terrorism Investigator’s Handbook, pp. 123-132, Jul. 2014, doi: 10.1016/B978-0-12-800743-3.00010-4.
H. Jahankhani, A. Al-Nemrat, and A. Hosseinian-Far, "Cybercrime classification and characteristics," Cyber Crime and Cyber Terrorism Investigator’s Handbook, pp. 149-164, Jul. 2014, doi: 10.1016/B978-0-12-800743-3.00012-8.
S. Gordon and R. Ford, "Cyberterrorism?," ComputSecur, vol. 21, no. 7, pp. 636-647, Nov. 2002, doi: 10.1016/S0167-4048(02)01116-1.
S. Taghavi Zargar, J. Joshi, D. Tipper, and S. Member, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks." [Online]. Available: www.google.com
M. R. Naeem, R. Amin, S. S. Alshamrani, and A. Alshehri, "Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition," ComputIntellNeurosci, vol. 2022, 2022, doi: 10.1155/2022/6294058.
R. Tahir, "A Study on Malware and Malware Detection Techniques," International Journal of Education and Management Engineering, vol. 8, no. 2, pp. 20-30, Mar. 2018, doi: 10.5815/ijeme.2018.02.03.
A. Chandra and M. J. Snowe, "A taxonomy of cybercrime: Theory and design," International Journal of Accounting Information Systems, vol. 38, Sep. 2020, doi: 10.1016/j.accinf.2020.100467.
E. Luiijf, "New and emerging threats of cyber-crime and terrorism," Cyber Crime and Cyber Terrorism Investigator’s Handbook, pp. 19-29, Jul. 2014, doi: 10.1016/B978-0-12-800743-3.00003-7.
T. Munk, "The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity," The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity, pp. 1-268, Jan. 2022, doi: 10.4324/9781003126676.
R. W. Taylor, E. J. Fritsch, J. Liederbach, M. R. Saylor, and W. L. Tafoya, Cyber crime and cyber terrorism.
"THE ZERO-DAY VULNERABILITY", doi: 10.24924/ijise/2021.04/v9.iss2/65.76.
Y. Li and Q. Liu, "A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments," Energy Reports, vol. 7, pp. 8176-8186, Nov. 2021, doi: 10.1016/j.egyr.2021.08.126.
A. Purwadi, C. Y. Serfiyani, and C. R. Serfiyani, "Legal Landscape on National Cybersecurity Capacity in Combating Cyberterrorism Using Deep Fake Technology in Indonesia," International Journal of Cyber Criminology, vol. 16, no. 1, pp. 123-140, Jan. 2022, doi: 10.5281/ZENODO.4766560.
R. Montasari, "Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom," Advances in Information Security, vol. 101, pp. 7-25, 2023, doi: 10.1007/978-3-031-21920-7_2.
D. Arce, "Cybersecurity For Defense Economists," Defence and Peace Economics, 2022, doi: 10.1080/10242694.2022.2138122.
M. Dodel and G. Mesch, "Cyber-victimization preventive behavior: A health belief model approach," Comput Human Behav, vol. 68, pp. 359-367, Mar. 2017, doi: 10.1016/j.chb.2016.11.044.
A. Staniforth, "Police investigation processes: Practical tools and techniques for tackling cyber-crimes," Cyber Crime and Cyber Terrorism Investigator’s Handbook, pp. 31-42, Jul. 2014, doi: 10.1016/B978-0-12-800743-3.00004-9.
S. Furnell, D. Emm, and M. Papadaki, "The challenge of measuring cyber-dependent crimes," Computer Fraud and Security, vol. 2015, no. 10, pp. 5-12, Oct. 2015, doi: 10.1016/S1361-3723(15)30093-2.
G. Cascavilla, D. A. Tamburri, and W. J. Van Den Heuvel, "Cybercrime threat intelligence: A systematic multi-vocal literature review," ComputSecur, vol. 105, Jun. 2021, doi: 10.1016/j.cose.2021.102258.
Cyberterrorism, digital age, cyber terrorists, vulnerabilities, security measures, etc.
IJATCA is fuelled by a highly dispersed and geographically separated team of dynamic volunteers. IJATCA calls volunteers interested to contribute towards the scientific development in the field of Computer Science.