IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today

Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today
View Sample PDF
Author(s): Flavia Zappa Leccisotti (Security Brokers SCpA, Italy), Raoul Chiesa (Security Brokers SCpA, Italy), Niccolo De Scalzi (University Tor Vergata, Italy), Leopoldo Gudas (University Tor Vergata, Italy)and Daniele De Nicolo (Security Brokers SCpA, Italy)
Copyright: 2016
Pages: 25
Source title: Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare
Source Author(s)/Editor(s): Metodi Hadji-Janev (Military Academy "General Mihailo Apostolski", Macedonia)and Mitko Bogdanoski (Military Academy "General Mihailo Apostolski", Macedonia)
DOI: 10.4018/978-1-4666-8793-6.ch005

Purchase


Abstract

The ICT technology is even more central in modern society. Every relevant sectors of Western economies depend on ICT technology, from Energy Infrastructure to banking and finance, from TLC infrastructure to government administration. Throughout history, terrorist organizations have demonstrated capacity to adapt and evolve in order to further their ideological and political goals. Cyber Terrorism is increasingly becoming a top five national security priority for Nation States. The purpose of this chapter is to evaluate the threat Cyber Terrorism poses to the stability of the international community. It will explore the concept of Cyber Terrorism, its interpretations and terminology. This chapter seeks to identify potential attacks made possible through IT and ICT technologies (like SCADA and Industrial Automation, while it includes those ICT standards used in the field of Transport, Automotive, and Social Networks as well) and to classify all the possible actors, needed skills and relevant goals, thanks to the currently available public documentation and relevant case studies.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom