SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Chu HC, Deng DJ, Chao HC, Huang YM. JUCS J. Univ. Comput. Sci. 2009; 15(12): 2373-2386.

Copyright

(Copyright © 2009, Graz University of Technology)

DOI

10.3217/jucs-015-12-2373

PMID

unavailable

Abstract

It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on civilians, corporations or the governments physically thousands of miles away and accomplish severe death polls than the traditional one. The government in the public sector or the private critical infrastructure administrators should not underestimate these potential cyber attacks. In this paper, we presented the cyber terrorism, the next generation of terrorism, to be a forthcoming and unavoidable threat to the global community as well as providing a potential rational cyber terrorist scenario, which could be the global cyber terrorism phenomena. This paper explicitly demonstrates the feasibility of launching cyber attacks toward critical infrastructures that might cause severe casualties.


Language: en

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print