The number of intrusions and attacks against critical
infrastructures and other information networks is increasing rapidly.
While there is no identified evidence that terrorist organizations are
currently planning a coordinated attack against the vulnerabilities of
computer systems and network connected to critical infrastructure,
and origins of the indiscriminate cyber attacks that infect computers
on network remain largely unknown. The growing trend toward the
use of more automated and menacing attack tools has also
overwhelmed some of the current methodologies used for tracking
cyber attacks. There is an ample possibility that this kind of cyber
attacks can be transform to cyberterrorism caused by illegal purposes.
Cyberterrorism is a matter of vital importance to national welfare.
Therefore, each countries and organizations have to take a proper
measure to meet the situation and consider effective legislation about
cyberterrorism.
[1] Borchgrave, A., William H.W. "Cybercrime, Cyberterrorism, Cyber
warfare", CSIS Publications, 1998
[2] Cameron, J., Vaile, D. "The War on Terrorism Vs. Cyber Liberties", IFIP
WG, 2003
[3] Cordesman, A.H. "Cyber-Threats, Information Warfare, and Critical
Infrastructure Protection", CSIS, 2002
[4] Denning, D.E. "Cyberterrorism", Global Dialogue, 2000
[5] Department of Defense, Office of General Counsel, "An Assessment of
International Legal Issues in Information Operations", 1991
[6] Garrison, L and Grand, M. "Cyberterrorism: An evolving concept", NIPC
Highlights, 2001
[7] Goodin, D. (1997) "Taking Aim at Cyberterrorism," Available:
http://news.com.com/2100-1023-204515.html
[8] Grossman, M. (1999) "Cyberterrorism", Available:
http://www.mgrossmanlaw.com/articles /1999/cyberterrorism.htm
[9] Jalil, S.A. "Countering Cyberterrorism Effectively: Are We Ready To
Rumble?", SANS Institute, 2003
[10] Kim, J. T., Park, S. Y. and Hyun, T. (2005) "An Inquiry into International
Countermeasures against Cyberterrorism", ICACT 2005
[11] Mitliaga, V. (2001) "Cyber-Terrorism: A Call for Governmental
Action?", Available: http://www.bileta.ac.uk/01papers/mitliaga.html
[12] Nagpal, R. "Cyberterrorism in the Context of Globalization," National
Seminar on "Globalization and Human Rights", 2002
[13] Pollitt, M.M. (2003) "Cyberterrorism - Fact or Fancy?", FBI Laboratory,
Available: http://www.cs.georgetown.edu/~denning/infosec/pollitt.html
[1] Borchgrave, A., William H.W. "Cybercrime, Cyberterrorism, Cyber
warfare", CSIS Publications, 1998
[2] Cameron, J., Vaile, D. "The War on Terrorism Vs. Cyber Liberties", IFIP
WG, 2003
[3] Cordesman, A.H. "Cyber-Threats, Information Warfare, and Critical
Infrastructure Protection", CSIS, 2002
[4] Denning, D.E. "Cyberterrorism", Global Dialogue, 2000
[5] Department of Defense, Office of General Counsel, "An Assessment of
International Legal Issues in Information Operations", 1991
[6] Garrison, L and Grand, M. "Cyberterrorism: An evolving concept", NIPC
Highlights, 2001
[7] Goodin, D. (1997) "Taking Aim at Cyberterrorism," Available:
http://news.com.com/2100-1023-204515.html
[8] Grossman, M. (1999) "Cyberterrorism", Available:
http://www.mgrossmanlaw.com/articles /1999/cyberterrorism.htm
[9] Jalil, S.A. "Countering Cyberterrorism Effectively: Are We Ready To
Rumble?", SANS Institute, 2003
[10] Kim, J. T., Park, S. Y. and Hyun, T. (2005) "An Inquiry into International
Countermeasures against Cyberterrorism", ICACT 2005
[11] Mitliaga, V. (2001) "Cyber-Terrorism: A Call for Governmental
Action?", Available: http://www.bileta.ac.uk/01papers/mitliaga.html
[12] Nagpal, R. "Cyberterrorism in the Context of Globalization," National
Seminar on "Globalization and Human Rights", 2002
[13] Pollitt, M.M. (2003) "Cyberterrorism - Fact or Fancy?", FBI Laboratory,
Available: http://www.cs.georgetown.edu/~denning/infosec/pollitt.html
@article{"International Journal of Business, Human and Social Sciences:60743", author = "Jeong-Tae Kim and Tchanghee Hyun", title = "Status and Requirements of Counter-Cyberterrorism", abstract = "The number of intrusions and attacks against critical
infrastructures and other information networks is increasing rapidly.
While there is no identified evidence that terrorist organizations are
currently planning a coordinated attack against the vulnerabilities of
computer systems and network connected to critical infrastructure,
and origins of the indiscriminate cyber attacks that infect computers
on network remain largely unknown. The growing trend toward the
use of more automated and menacing attack tools has also
overwhelmed some of the current methodologies used for tracking
cyber attacks. There is an ample possibility that this kind of cyber
attacks can be transform to cyberterrorism caused by illegal purposes.
Cyberterrorism is a matter of vital importance to national welfare.
Therefore, each countries and organizations have to take a proper
measure to meet the situation and consider effective legislation about
cyberterrorism.", keywords = "Cyberterrorism, cyber attack, information security,
legislation", volume = "1", number = "6", pages = "251-4", }