Welcome to Francis Academic Press

The Frontiers of Society, Science and Technology, 2021, 3(1); doi: 10.25236/FSST.2021.030115.

The Study of the Plight of Cyberterrorism and Its Way Out

Author(s)

Mingyang Gao1, Yingjie Dong2, Xueding Qiao3, Shuo Fan4

Corresponding Author:
Mingyang Gao
Affiliation(s)

1School of International Relations, Xi’an International Studies University, Xi’an 710000, China

2Shenzhen Academy of International Education, Shenzhen 518000, China

3Qingdao No.2 Middle School of Shandong Province, Qingdao 266001, China

4Rabun Gap Nacoochee School, Rabun Gap 30568, United States

Abstract

After “9.11”, terrorist attacks have been increasingly relying on cyberspace, posing an im-minent threat to national security. This article introduces two types of cyberterrorism attack: target oriented and tool oriented. Target oriented attack means terrorists directly attack networking device, while tool oriented is the activity making use of Internet tools. Moreover, in the work, three counter-measures and five futures for cyberterrorism are also discussed. This article suggests that understand-ing cyberterrorism in a board sense, and do not underestimate the serious situation.

Keywords

Cyberterrorism, Target oriented, Tool oriented, National security, Countermeasures

Cite This Paper

Mingyang Gao, Yingjie Dong, Xueding Qiao, Shuo Fan. The Study of the Plight of Cyberterrorism and Its Way Out. The Frontiers of Society, Science and Technology (2021) Vol. 3, Issue 1: 93-98. https://doi.org/10.25236/FSST.2021.030115.

References

[1] Robin A Gandhi, William Sousan, Phillip A. Laplante, "Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political," IEEE Technology and Society Magazine, Vol. 30, No. 1 (2011), pp. 28-38

[2] For more information about cyber information theft, please visit L. D. Roberts, D. Indermaur, C. Spiranovic, "Fear of Cyber-Identity Theft and Related Fraudulent Activity," Psychiatry, Psychology and Law, Vol.20, No.3(2013), pp.315-328

[3] For more information about denial service attack, please visit  Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei Gurtov,” Overview of 5G Security Challenges and Solutions," IEEE Communications Standards Magazine, Vol. 2, No. 1 (2018), pp. 36-43

[4] A. Al. Mazari, A. H. Anjariny, S. A. Habib, E. Nyakwende, "Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies," International Journal of Cyber Warfare and Terrorism, Vol.6 (2016), pp. 1-12

[5] Gerald O’Hara, "Cyber-Espionage: A growing threat to the American economy," CommLaw Con-spectus, Vol. 19 (2010), pp. 241-275.

[6] Joseph Lieberman and Susan Collins, Violent Islamist extremism, the internet, and the homegrown terrorist threat (Washington D. C.: United States Senate Committee on Homeland Security and Gov-ernmental Affairs, 2008)

[7] Anne Aly, Stuart Macdonald, Lee Jarvis & Thomas M. Chen, “Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization”, Studies in Conflict & Terrorism, Vol.40, 2017

[8] Charlie Winter, The Virtual ‘Caliphate’: Understanding Islamic State’s Propaganda Strategy (London: The Quilliam Foundation, 2015).

[9] Ben Brumfield, “Officials: 3 Denver girls played hooky from school and tried to join ISIS”, CNN, October 22, 2014, accessed August 30, 2015, http://edition.cnn.com/2014/10/22/us/colorado-teens-syria-odyssey/index.html.

[10] Lee Jarvis, Stuart Macdonald, “Responding to Cyberterrorism: Options and Avenues”, Georgetown Journal of International Affairs (Fall 2015), pp.134-143.

[11] Atlantic Council, “The Five Futures of Cyber Conflict and Cooperation,” https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-five-futures-of-cyber-conflict-and-cooperation/ (Accessed: 07-02-2020).