Information Technology Reference
In-Depth Information
spreading disinformation, jamming the web by attacking ISP's and government sites in
order to create damage and chaos.
3.
TACTICAL ATTACKS
Attacking civil services like electricity, water supply, government services, banking,
etc., can also cause chaos and disorder.
4.
STRATEGIC ATTACKS
Combining “regular” terrorism with attacks on civil emergency services such as fire
departments, the Red Cross, hospitals, communications, etc., creates chaos on the site of
the bombing as well as on the infrastructure.
5.
MEGA ATTACKS
These attacks take place on a very large scale on strategic national sites such as arms
control, missile control, air-traffic control, money transfer, etc.
6.
FIGHTING BACK
The world is not ready for this kind of terrorism or the fight back. The key word comes
from Dr. Azarov's statement that - “there is a need to define and specify this notion”.
7.
CONCLUSIONS
Definition is the key problem in fighting terrorism as a whole, cyber-terrorism
included. In all international treaties, decisions or declarations, there is no accepted
definition. National political motives still influence this phenomena and one man's
terrorist is another's freedom fighter.
This is also the case when dealing with cyber-terrorism. We need an accepted term and
real cooperation of all nations, where host countries that give shelter to the terrorists are
punished. We need full cooperation between governments, industry, the providers, and
every other involved element which might be a key figure in this war.
Nowadays, about 90% of illegal activities on the web are by hackers who attack for
fun or some “private” motive. About 10% are “hired swords”, using the infrastructure of
the countries in which they are based.
If the world would just recognize the need to fight back, in the way it decided to fight
child pornography on the web, there would be a hope of defeating cyber-terrorism while
it is still “young”.
Search WWH ::




Custom Search