IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Spear Phishing: The Tip of the Spear Used by Cyber Terrorists

Spear Phishing: The Tip of the Spear Used by Cyber Terrorists
View Sample PDF
Author(s): Arun Vishwanath (University at Buffalo, USA)
Copyright: 2016
Pages: 16
Source title: Combating Violent Extremism and Radicalization in the Digital Era
Source Author(s)/Editor(s): Majeed Khader (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Loo Seng Neo (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Gabriel Ong (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Eunice Tan Mingyi (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore)and Jeffery Chin (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore)
DOI: 10.4018/978-1-5225-0156-5.ch023

Purchase

View Spear Phishing: The Tip of the Spear Used by Cyber Terrorists on the publisher's website for pricing and purchasing information.

Abstract

The ubiquitous use of the Internet has made it possible for terrorist groups to remotely foment attacks with little risk of capture. Among the newest forms of attacks is cyber hacking, which has seen increased use by terrorist groups for acts ranging from pinpointing targets for assassination to holding organisations hostage and embarrassing governments. In almost all these attacks, spear phishing is the vector used to gain access to a computer network – making it imperative that policymakers find ways to stop it. This chapter provides an overview of the different types of spear phishing attacks and the reasons they succeed. The chapter then provides an overview of the different strategies being used to combat it and their relative effectiveness. Drawing from the latest social science research and from initiatives that have worked around the world, the chapter culminates with six policy suggestions, which could significantly reduce the effectiveness of spear phishing and protect nations from a major cyber attack.

Related Content

N. L. Swathi, Achukutla Kumar. © 2024. 17 pages.
Gurwinder Singh, Anshika Thakur. © 2024. 21 pages.
Ashok Singh Gaur, Hari Om Sharan, Rajeev Kumar. © 2024. 16 pages.
Sabyasachi Pramanik. © 2024. 17 pages.
Geetha Manoharan, Abdul Razak, C. V. Guru Rao, Sunitha Purushottam Ashtikar, M. Nivedha. © 2024. 28 pages.
Roop Kamal, Manpreet Kaur, Jaspreet Kaur, Shivani Malhan. © 2024. 10 pages.
Anu Sharma. © 2024. 8 pages.
Body Bottom