Cyberterrorism definition patterns and mitigation strategies: A literature review
This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years....
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Science and Research (IJSR)
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/54453/ http://irep.iium.edu.my/54453/1/2017-Cyberterrorism%20Definition%20Patterns%20and%20Mitigation%20Strategies%20-%20A%20Lit.%20Review.pdf |
| _version_ | 1848784416140165120 |
|---|---|
| author | SEissa, Israa G. Ibrahim, Jamaludin Yahaya, Nor-Zaiasron |
| author_facet | SEissa, Israa G. Ibrahim, Jamaludin Yahaya, Nor-Zaiasron |
| author_sort | SEissa, Israa G. |
| building | IIUM Repository |
| collection | Online Access |
| description | This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies. |
| first_indexed | 2025-11-14T16:36:54Z |
| format | Article |
| id | iium-54453 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T16:36:54Z |
| publishDate | 2017 |
| publisher | International Journal of Science and Research (IJSR) |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-544532017-12-13T10:07:53Z http://irep.iium.edu.my/54453/ Cyberterrorism definition patterns and mitigation strategies: A literature review SEissa, Israa G. Ibrahim, Jamaludin Yahaya, Nor-Zaiasron HM811 Deviant behavior. Social deviance This paper aim to contribute to the body of knowledge on cyber terrorism, improves awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies through analysis of relevant literature on the issue produced in recent years. It details the definitional origins of the concept and It looks at motivational factors and level of destruction necessary to classify a cyber-attack as cyberterrorism. The second sections is devoted to literature distinguishing cyberterrorism from hacking and cybercrime. Section three details the stages of a cyber attack, Section four lists the types of infrastructure targeted for cyber terrorists and Section five focuses on mitigation strategies. International Journal of Science and Research (IJSR) 2017-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/54453/1/2017-Cyberterrorism%20Definition%20Patterns%20and%20Mitigation%20Strategies%20-%20A%20Lit.%20Review.pdf SEissa, Israa G. and Ibrahim, Jamaludin and Yahaya, Nor-Zaiasron (2017) Cyberterrorism definition patterns and mitigation strategies: A literature review. International Journal of Science and Research (IJSR), 6 (1). pp. 180-186. ISSN 2319-7064 https://www.ijsr.net/archive/v6i1/ART20163936.pdf |
| spellingShingle | HM811 Deviant behavior. Social deviance SEissa, Israa G. Ibrahim, Jamaludin Yahaya, Nor-Zaiasron Cyberterrorism definition patterns and mitigation strategies: A literature review |
| title | Cyberterrorism definition patterns and mitigation
strategies: A literature review |
| title_full | Cyberterrorism definition patterns and mitigation
strategies: A literature review |
| title_fullStr | Cyberterrorism definition patterns and mitigation
strategies: A literature review |
| title_full_unstemmed | Cyberterrorism definition patterns and mitigation
strategies: A literature review |
| title_short | Cyberterrorism definition patterns and mitigation
strategies: A literature review |
| title_sort | cyberterrorism definition patterns and mitigation
strategies: a literature review |
| topic | HM811 Deviant behavior. Social deviance |
| url | http://irep.iium.edu.my/54453/ http://irep.iium.edu.my/54453/ http://irep.iium.edu.my/54453/1/2017-Cyberterrorism%20Definition%20Patterns%20and%20Mitigation%20Strategies%20-%20A%20Lit.%20Review.pdf |