Featured Research

from universities, journals, and other organizations

How do we fight the war against cyber terrorism?

Date:
April 11, 2011
Source:
Inderscience Publishers
Summary:
The Internet has no borders, no universal legislation, and although highly social and distributed is not represented by cooperation across the globe. Given those characteristics how might nations make their plans for counter terrorism in cyberspace as active online as they are in the everyday world?

The Internet has no borders, no universal legislation, and although highly social and distributed is not represented by cooperation across the globe. Given those characteristics how might nations make their plans for counter terrorism in cyberspace as active online as they are in the everyday world?

Related Articles


A collaboration between researchers in the US and Iran hoped to address that issue and its findings are published this month in the International Journal of Internet Technology and Secured Transactions.

Incidence of online crime has grown considerably in recent years, with terms such as malware, Trojans, bot-nets and phishing attacks entering the common vernacular. There has also been a significant increase in activity that might at best be described as international commercial sabotage but that some would label more sensationally as cyber-terrrorism. Much of the illicit activity that leads to internet outages, malware infections and other virtual atrocities are being carried out with purely criminal intent. However, there are alleged attacks orchestrated by whole nations against other countries, corporations and organizations that might truly be described more accurately as a form of terrorism.

Arash Barfar from the University of South Florida in Tampa and Kiyana Zolfaghar and her colleague from the KN Toosi University of Technology in Tehran, suggest that the first step that must be taken to surmount the barriers of failed cooperation and legislation is to organize national efforts to use "web mining" techniques and "honeypots" to wheedle out cyber-terrorists before they attack.

"The internet is a very important channel not only for communication, but also for searching information and for doing business, the pattern of counter terrorism should efficiently reflect that," the team says. They have now developed a framework that would allow leaders to develop and use the necessary tools to trace cyber terrorists effectively in real-time and to make arrests before any potentially debilitating attack were to take place.

Journal:"A framework for cyber war against international terrorism" in Internet Technology and Secured Transactions, 2011, 3, 29-39


Story Source:

The above story is based on materials provided by Inderscience Publishers. Note: Materials may be edited for content and length.


Cite This Page:

Inderscience Publishers. "How do we fight the war against cyber terrorism?." ScienceDaily. ScienceDaily, 11 April 2011. <www.sciencedaily.com/releases/2011/04/110411103717.htm>.
Inderscience Publishers. (2011, April 11). How do we fight the war against cyber terrorism?. ScienceDaily. Retrieved April 1, 2015 from www.sciencedaily.com/releases/2011/04/110411103717.htm
Inderscience Publishers. "How do we fight the war against cyber terrorism?." ScienceDaily. www.sciencedaily.com/releases/2011/04/110411103717.htm (accessed April 1, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Wednesday, April 1, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Voice-Controlled GPS Helmet to Help Bikers

Voice-Controlled GPS Helmet to Help Bikers

Reuters - Innovations Video Online (Apr. 1, 2015) Motorcyclists will no longer have to rely on maps or GPS systems, both of which require riders to take their eyes off the road, once a new Russian smart helmet goes on sale this summer. Jim Drury reports. Video provided by Reuters
Powered by NewsLook.com
US Cybercrime Sanctions Will Target High-Profile Attackers

US Cybercrime Sanctions Will Target High-Profile Attackers

Newsy (Apr. 1, 2015) An executive order makes retaliatory sanctions against cybercriminals a matter of policy. Video provided by Newsy
Powered by NewsLook.com
7-Year-Old Girl Gets 3-D Printed 'robohand'

7-Year-Old Girl Gets 3-D Printed 'robohand'

AP (Mar. 31, 2015) Although she never had much interest in prosthetic limbs before, Faith Lennox couldn&apos;t wait to slip on her new robohand. The 7-year-old, who lost part of her left arm when she was a baby, grabbed it as soon as it came off a 3-D printer. (March 31) Video provided by AP
Powered by NewsLook.com
Dash Button Shows Amazon Is Going After Grocers

Dash Button Shows Amazon Is Going After Grocers

Newsy (Mar. 31, 2015) Dash Button enables you to order regular household items with the push of a button, yet another play by Amazon to grab everyday customers. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins