CYBERTERRORISM: RISING THREATS AND STRATEGIC RESPONSES

Автор: Andro Gotsiridze
Организация: Cybersecurity Education and Research Centre

Категория:

Ключевые слова: Cyber attacks, cyber terrorism, RaaS, MaaS, DDoS- for-hire
Аннотация. Cyberspace, as one of the domains of conflict, often gives a weak actor with few resources an asymmetric advantage over a strong opponent, as it provides the development and use of offensive capabilities with limited financial, human or organizational resources. With this, cyberoperations increase area of disinformation penetration and distribution, the ability to influence the audience, which is why they are widely used in information campaign production. Nowadays, the most of cyber-attacks that cause immense damage, disruptions of financial loss are carried out by criminal organizations or state actors, not terrorist organizations. Nevertheless, cyber capabilities are developing all over the world, and proliferation control tools, financial and technical barriers are scarce and ineffective, which is why new technologies and intelligence vital to conduct cyber operations are becoming more and more accessible for terrorist organizations. This article overviews those technical and organizational factors that increase the threat of cyber terrorism; it also provides a list of countermeasures to be implemented by the state and critical infrastructure.

Библиография:

Cyber Terrorism: Assessment of the Threat to Insurance, Cambridge: Centre for Risk Studies, November 2017
ICCT Press Publication. Handbook of Terrorism Prevention and Preparedness. July 2021. Chapter 29. Shashi Jayakumar. Cyber Attacks by Terrorists and other Malevolent Actors: Prevention and Preparedness. DOI: 10.19165/2020.6.01 ISSN: 2468-0486 ISBN: 9789090339771
G. Weimann; 2005. ‘Cyberterrorism: The Sum of All Fears?’, Studies in Conflict & Terrorism. 28:129-149, 2005
Simon P. Handler. THE CYBER STRATEGY AND OPERATIONS OF HAMAS: Green Flags and Green Hats. Atlantic Council Cyber Statecraft Initiative. 2022.
Michael Schmitt, “Normative Voids and Asymmetry in Cyberspace,” Just Security, December 29, 2014