Query Result Set
Skip Navigation Links
   ActiveUsers:1525Hits:18399813Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER TERRORISM (35) answer(s).
 
12Next
SrlItem
1
ID:   055534


Al qaeda and the internet: the danger of "Cyberplanning" / Thomas , Timothy   Journal Article
Thomas , Timothy Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
2
ID:   054174


Bangs for the Buck: a cost-benefit analysis fo cyberterrorism / Giacomello, Giampiero Sep-Oct 2004  Journal Article
Giacomello, Giampiero Journal Article
0 Rating(s) & 0 Review(s)
Publication 2004.
Key Words Information Warfare  Terrorism  Internet  Cyber Terrorism 
        Export Export
3
ID:   166289


Bytes, bombs and spies: the strategic dimensions of offensive cyber operations / Lin, Herbert (ed.); Zegart, Amy (ed.) 2018  Book
Lin, Herbert (ed.) Book
0 Rating(s) & 0 Review(s)
Publication Washington, D C, Brookings Institution Press, 2018.
Description xiii, 424p.pbk
Standard Number 9780815735472
   Reserve     Export Export
Copies: C:1/I:1,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocationIssuedToDueOn
059656355.0305/LIN 059656MainIssuedGeneral RF07617-Jun-2023
4
ID:   133050


Challenges of global terrorism / Thapliyal, Sheru   Journal Article
Thapliyal, Sheru Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract There should be no distinction between a good and a bad terrorist which is what some countries are trying to do. The scourge will consume all unless it is ruthlessly eliminated. Countries sponsoring terrorism might realise that it is like riding a tiger that, one day, they might tall prey to. The biggest worry at these countries which have sulterecl at the hands at terrorists is that Weapons of Mass Destruction may fall into the hands at the terrorists and that catastrophic consequences would tollowi A worldwide integrated approach to tackling terrorism is, therefore, a must.
        Export Export
5
ID:   153168


Cyber enigma: unraveling the terror in the cyber world / Dilipraj, E 2017  Book
Dilipraj, E Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, KW Publishers Pvt Ltd, 2017.
Description xxii, 262p.hbk
Standard Number 9789386288578
Key Words India  Cyberspace  Cyber Terrorism  Hacking  Cyber World  Dark Digital Ocean 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059078363.325/DIL 059078MainOn ShelfGeneral 
6
ID:   057243


Cyber surveillance: threats and new technologies / Deva, Yashwant   Journal Article
Deva, Yashwant Journal Article
0 Rating(s) & 0 Review(s)
Publication 2003.
        Export Export
7
ID:   055245


Cyber terrorism / Lamba , G S   Journal Article
Lamba , G S Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
8
ID:   133607


Cyber terrorism: electronic Jihad / Heickero, Roland   Journal Article
Heickero, Roland Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Cyber terrorism is a phenomenon that is gaining more and more attention. One reason for this is the concern that modern information and communications technology may be used in order to harm open societies. This concern also involves actual IT systems and the information generated being targets of advanced attacks. That way functions that are important to society could be affected. The term 'cyber terrorism' is complex. This article describes the difference between traditional and cyber terrorism. The main focus is on how the al-Qaeda terrorist network acts in cyberspace and how their change in concentration and activities has made them a clever player in an electronic Jihad.
        Export Export
9
ID:   023711


Cyber terrorism and national seurity / Bhattarcharjee Subimal Jan-March 2003  Article
Bhattarcharjee Subimal Article
0 Rating(s) & 0 Review(s)
Publication Jan-March 2003.
Description 69-80
        Export Export
10
ID:   133609


Cyberspace: the new strategic realm in US-China relations / Segal, Adam M   Journal Article
Segal, Adam M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract In June 2013, President Obama met with President Xi Jinping at Sunnylands, California. The meeting was seen as a chance for the two leaders to get to know each other in a relatively informal setting so they could address the growing mistrust between their countries. While maritime disputes, trade tensions and differences over how to contain the North Korean and Iranian nuclear programmes were high on the agenda, cyber security-in particular Chinese cyber espionage-was the defining issue of this unusual summit. For the US, the meeting between the two presidents was the culmination of a long campaign to pressure Beijing to reduce the scope and scale of Chinese cyber attacks on the United States.
        Export Export
11
ID:   141532


Cyberspace and national security: threats, opportunities and power in a virtual world / Reveron, Derek S (ed.) 2013  Book
Reveron, Derek S (ed.) Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Satyam Law International, 2013.
Description ix, 246p.: ill.pbk
Standard Number 9789382823001
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058334355.033002854678/REV 058334MainOn ShelfGeneral 
12
ID:   068474


Cyber-Terrorism: the newest pace of terror / Gera, Y K   Article
Gera, Y K Article
0 Rating(s) & 0 Review(s)
Publication 1999.
        Export Export
13
ID:   118119


Decoding cyber terrorism: towards a culture of international co-operation / Sharma, M K   Journal Article
Sharma, M K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
14
ID:   124104


Enemy without boundaries / Porche III, Isaac R.; Sollinger, Jerry M.; McKay, Shawn   Journal Article
Porche III, Isaac R. Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The article offers comments on the need for a strategy and policy to respond to cyber attack as it is allegedly impossible to block every cyber attack. It is suggested that the industries learn from the vulnerability of the networks attacked while understanding that there is no single defense against a sophisticated and constantly morphing offense. Comments on cyberspace having no boundaries and changing constantly and the need to formulate active defense are also included.
        Export Export
15
ID:   128750


Evidence on threats: observations of parliament's standing committee on defence 2013-2014 / Force   Journal Article
Force Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
16
ID:   138669


Evolution of internet, cyber crimes and countermeasures / Seth, Ashok K   Article
Seth, Ashok K Article
0 Rating(s) & 0 Review(s)
Key Words Cyber Security  Internet  Cyber Warfare  Cyber Terrorism  Hacking  Defence System 
Virus  Cyber Crimes  WWW  Cyber Espionage  Cyber Murder  Intrusion Attack 
Worm  Cyber Campaign  Bot  Cyber Sabotage 
        Export Export
17
ID:   084848


eWMDs / Kelly, John J; Almann, Lauri   Journal Article
Kelly, John J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Key Words Internet  Cyber crime  Cyber Warfare  Cyber Terrorism  E- CCyber Space 
        Export Export
18
ID:   174826


Hacked IT superpower: how India secures its cyberspace as a rising digital democracy / Ebert, Hannes   Journal Article
Ebert, Hannes Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Why has India developed into one of the world’s top targets and sources of cyber attacks despite possessing a strategic edge in information and communications technology (ICT)? India has one of the most competitive ICT industries and workforces, largest global sourcing and fastest growing e-commerce markets, and second largest and fastest growing internet user base, and is a leader in using ICT to provide governance services, yet its economic and political information infrastructures have been disproportionality affected by cyber attacks. This article traces the evolution of cyber threats to India’s national security and identifies drivers of the national and international policies the Indian state has adopted to address these threats in the past two decades. It finds evidence for a growing gap between the ideation and implementation of cyber security legislation and policy, which is rooted in the political constraints inherent in India’s state capacity-building efforts, reluctance to engage in multistakeholder coordination, and struggles to yield gains from its hedging diplomacy in global cyber security negotiations. For the Security Studies scholarship on the sources of cyber insecurity, these findings highlight the need to further study the links between different types of cyber capacity, state structure and political systems as well as the specific conditions under which quickly digitizing democracies can effectively translate their ICT capacities and regulations into greater cyber resilience.
        Export Export
19
ID:   110120


Indian armed forces and space technology / Lele, Ajey   Journal Article
Lele, Ajey Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
20
ID:   125249


Major issues of the national cyber security system in South Kor / Do, Kim Young; Sung, Kim Jin; Ho, Lee Kyung   Journal Article
Do, Kim Young Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract the national cyber security system (NCSS) of South Korea came under criticism when North Korean cyber terrorist attacked the office computers and servers of major south Korean broadcasting and financial companies on March 20, 2013. The NCSS had evolved up to that time by addressing problems, that arose from incidents dating to the January 25, 2003, internet crisis, the March 4, 2011 distributed denial of service (DDoS) crisis, and other event occurring between those attacks. The above 2013 cyber terrorism incident magnified the limits of NCSS leadership, expertise and collaborative systems, while revealing that past reform were nothing more than stopgap measures.
        Export Export
12Next