ORPP logo
Image from Google Jackets

Terrorist Use of Cyberspace and Cyber Terrorism : New Challenges and Responses.

By: Material type: TextTextSeries: NATO Science for Peace and Security Series - d: Information and Communication Security SeriesPublisher: Amsterdam : IOS Press, Incorporated, 2015Copyright date: ©2015Edition: 1st edDescription: 1 online resource (223 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781614995289
Subject(s): Genre/Form: Additional physical formats: Print version:: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and ResponsesDDC classification:
  • 005.8
LOC classification:
  • TK5105.59 .T477 2015
Online resources:
Contents:
TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES -- Foreword -- Contents -- The Use of Internet Technology by Cyber Terrorists &amp -- Cyber Criminals: The 2014 Report -- Steganography in Support of the Global Terrorism -- Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries -- Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals -- The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity -- Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack -- From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation -- How Human Issues Impact Confronting Cyber Terrorism -- Human Factor Dual Role in Modern Cyberspace Social Engineering -- Tackling Terrorists' Use of the Internet: Propaganda Dispersion &amp -- the Threat of Radicalization -- Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace -- Cultural Aspects of Information Sharing and Collaboration -- Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do) -- The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace -- Assessing and Responding to the Cyberterrorism Threat -- Subject Index -- Author Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES -- Foreword -- Contents -- The Use of Internet Technology by Cyber Terrorists &amp -- Cyber Criminals: The 2014 Report -- Steganography in Support of the Global Terrorism -- Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries -- Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals -- The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity -- Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack -- From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation -- How Human Issues Impact Confronting Cyber Terrorism -- Human Factor Dual Role in Modern Cyberspace Social Engineering -- Tackling Terrorists' Use of the Internet: Propaganda Dispersion &amp -- the Threat of Radicalization -- Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace -- Cultural Aspects of Information Sharing and Collaboration -- Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do) -- The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace -- Assessing and Responding to the Cyberterrorism Threat -- Subject Index -- Author Index.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.