iDEA: Drexel E-repository and Archives >
Drexel Academic Community >
College of Information Science and Technology >
Research Day Posters (IST) >
Cyber-terrorism: hackers becoming terrorists or terrorists becoming hackers?
Please use this identifier to cite or link to this item:
|Title: ||Cyber-terrorism: hackers becoming terrorists or terrorists becoming hackers?|
|Authors: ||Abraham, Sunil George|
|Keywords: ||Computer security|
|Issue Date: ||9-Sep-2005|
|Series/Report no.: ||IST Research Day 2005 posters;no. 420|
|Abstract: ||The skill required to perpetrate information warfare has been pointed out as one of the obstacles for terrorist organizations. We discuss the ways terrorists may be addressing this. Rogers’ (2001) hacker taxonomy is used to dissect the hacker community, so as to identify the subset of hackers (or crackers) with the criminal inclination, and who might be hired or recruited. A generalized profile match reveals that, although there exists some similarity between the profiles, violence or physical harm has not yet been on the agenda for criminal hackers. We consider the possibility of terrorists getting trained in computer hacking for carrying out cyber-terrorism, by utilizing the training resources available freely on the World Wide Web, or by obtaining training through certificate programs. In this paper we analyzed the existing definitions of cyber-terrorism, so as to elicit a definition that is consistent with the true nature of cyber-terrorism. We believe that, while cyber-terrorism has to be treated as a variant of conventional terrorism, varying in the mode of attack, and the immediate target (computer networks/information infrastructure), there are important issues that need to be addressed which have not been sufficiently discussed in the literature. This would show that cyberspace might be a tool of terrorism without being a venue.|
|Appears in Collections:||Research Day Posters (IST)|
Items in iDEA are protected by copyright, with all rights reserved, unless otherwise indicated.