Status and Requirements of Counter-Cyberterrorism

The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect computers on network remain largely unknown. The growing trend toward the use of more automated and menacing attack tools has also overwhelmed some of the current methodologies used for tracking cyber attacks. There is an ample possibility that this kind of cyber attacks can be transform to cyberterrorism caused by illegal purposes. Cyberterrorism is a matter of vital importance to national welfare. Therefore, each countries and organizations have to take a proper measure to meet the situation and consider effective legislation about cyberterrorism.




References:
[1] Borchgrave, A., William H.W. "Cybercrime, Cyberterrorism, Cyber
warfare", CSIS Publications, 1998
[2] Cameron, J., Vaile, D. "The War on Terrorism Vs. Cyber Liberties", IFIP
WG, 2003
[3] Cordesman, A.H. "Cyber-Threats, Information Warfare, and Critical
Infrastructure Protection", CSIS, 2002
[4] Denning, D.E. "Cyberterrorism", Global Dialogue, 2000
[5] Department of Defense, Office of General Counsel, "An Assessment of
International Legal Issues in Information Operations", 1991
[6] Garrison, L and Grand, M. "Cyberterrorism: An evolving concept", NIPC
Highlights, 2001
[7] Goodin, D. (1997) "Taking Aim at Cyberterrorism," Available:
http://news.com.com/2100-1023-204515.html
[8] Grossman, M. (1999) "Cyberterrorism", Available:
http://www.mgrossmanlaw.com/articles /1999/cyberterrorism.htm
[9] Jalil, S.A. "Countering Cyberterrorism Effectively: Are We Ready To
Rumble?", SANS Institute, 2003
[10] Kim, J. T., Park, S. Y. and Hyun, T. (2005) "An Inquiry into International
Countermeasures against Cyberterrorism", ICACT 2005
[11] Mitliaga, V. (2001) "Cyber-Terrorism: A Call for Governmental
Action?", Available: http://www.bileta.ac.uk/01papers/mitliaga.html
[12] Nagpal, R. "Cyberterrorism in the Context of Globalization," National
Seminar on "Globalization and Human Rights", 2002
[13] Pollitt, M.M. (2003) "Cyberterrorism - Fact or Fancy?", FBI Laboratory,
Available: http://www.cs.georgetown.edu/~denning/infosec/pollitt.html