Cyberterrorism


Also found in: Dictionary, Thesaurus, Encyclopedia, Wikipedia.
Any premeditated, politically-motivated attack by sub-national groups or clandestine agents against information, computer systems, computer programs, and data which results in violence against non-combatant targets
References in periodicals archive ?
The fact that the passive personality doctrine, in comparison to other jurisdictional principles, constitutes such a significant encroachment on other nations' sovereignty also militates against extending this doctrine to cyberterrorism.
Partisanship affects how Americans view several of the potential threats, though there is virtually no difference between Democrats and Republicans (including those who lean to either party) on cyberterrorism.
Moreover, as part of a broader effort to build international norms and agreements in the cyber realm, creating a legal framework for prosecution with a strong foundation in international law would be a critical step forward in building a global approach to defeat cyberterrorism.
Without a doubt, cyberterrorism poses a real threat to governments, organizations and individuals around the globe.
Barry Collin first introduced the term cyberterrorism in the 1980s, although just as experts have not formed a consensus definition of terrorism, there is still no unifying definition of cyberterrorism.
Cyberterrorism has been defined as 'the politically-motivated use of computers as weapons or as targets, by sub-national groups or clandestine agents intent on violence, to influence an audience or cause a government to change its policies'.
Bulgaria is planning to build a special center whose task would be to combat cyberterrorism.
In the last few months, we have been hearing more and more about cyberterrorism and the growing number of attacks on our nation's information technology infrastructure.
Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and cyberattacks are occurring with increased frequency.
He avoids highly technical explanation as he provides descriptions of various kinds of attacks, threats, and fraudulent activities related to personal and organizational digital resources, such as cyberterrorism, hijacking, phishing, spamming, viruses, and identity theft, and ways to combat them.
The triple threat of cybercrime, cyberterrorism, and asymmetric information warfare is here to stay.
The other slender volumes take similar approaches, as in Policing the Internet, with articles debating, among other subjects, whether the government should regulate the Internet, whether cyberterrorism is a serious threat, and whether social-networking sites contribute to crime.