The report has drawn on a broad range of sources including government documents (e.g. At the end of each chapter a brief annotated bibliography is included to assist future research and give readers more information about the sources used. Chapters on cyber weapons, critical infrastructure, attribution, Internet of Things, recruitment and propaganda, financing, legislation and counter measures, and cyberwar.Įach chapter provides a brief summary of a key aspect of the cyber terror phenomenon, an analysis of emerging trends or perspectives, and other relevant information or examples identified during the research. This review of cyber-terrorism outlines the main trends and challenges presented by the convergence of the exceptional reach, speed and scale of the Internet and the political ambitions of violent extremists.
0 Comments
Leave a Reply. |