IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyberattacks, Cybercrime and Cyberterrorism

Cyberattacks, Cybercrime and Cyberterrorism
View Sample PDF
Author(s): Saurabh Ranjan Srivastava (Malviya National Institute of Technology, India)and Sachin Dube (Malviya National Institute of Technology, India)
Copyright: 2018
Pages: 22
Source title: Handbook of Research on Network Forensics and Analysis Techniques
Source Author(s)/Editor(s): Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B. B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France)and Nilanjan Dey (Department of Information Technology, Techno India College of Technology, Kolkata, India)
DOI: 10.4018/978-1-5225-4100-4.ch010

Purchase

View Cyberattacks, Cybercrime and Cyberterrorism on the publisher's website for pricing and purchasing information.

Abstract

This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism.' Contrasting to non-lethal terms such as ‘internet vandalism' and ‘hacktivism,' cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping our eyes open, establishments can go a long way to avert cyberterror attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom