Professional Documents
Culture Documents
Get started
Cyber Terrorism:
understanding and
preventing acts of terror
within our cyber space
Littl3field
Follow
Contents
2. Executive Summary
2.1 Keywords
3. Introduction
3.1 Aim and methodology
4. What is cyber terrorism?
4.1 Origins and definitions of cyber terrorism
4.2 Case studies 4.3 Areas of cyber terrorism
4.4 Potential threats
5 Present and future security measures
5.1 What is being done to prevent cyber terrorism?
5.2 Preventions, mitigations and consequence management of
future attacks 6. Conclusion and suggestions moving forward
7. References
2. Executive Summary
3. Introduction
Targeted Attacks
• Spear-Phishing — These attacks are much the same as the’
Phishing’ mentioned previously, however specifically targeted at
an individual or organisation.
• Distributed Denial of Service — This is to deploy a mass amount
of packet requests, often from a Botnet , to a 1 website or network
in order to overload the system and prevent regular access by
legitimate users.
• Supply chain — attacking an element of an organisation before it
arrives (GCHQ, Cert-UK, 2015).
• Zero-day — Bespoke exploitation of a system with specific
vulnerabilities not yet known to the author (National Cyber
Security Centre, 2016).
4.4 Potential threats
6. References
Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P.
(2011). Dimensions of Cyber-Attacks: Cultural, Social, Economic,
and Political. IEEE Technology And Society Magazine, 30(1), 28–
38. http://dx.doi.org/10.1109/ mts.2011.940293