6 research outputs found

    A Dynamic Cyber Terrorism Framework

    Get PDF
    Abstract—Many nations all over the world have increased their dependency on cyberspace by maximizing the use of Information and Communication Technology (ICT). In this digital age, the concept of cyber terrorism or the use of cyberspace to carry out terrorist activities has emerged. Interestingly, there are many concepts of cyber terrorism provided by researchers, policy makers and individuals. This paper proposes a framework describing the core components of cyber terrorism. The authors have analyzed the data by using a grounded theory approach, in which the framework is drawn. The framework defines cyber terrorism from six perspectives: Target, motivation, method of attack, domain, action by perpetrator, and impact. In addition, the proposed framework provides a dynamic way in defining cyber terrorism as well as describing its influential considerations. Continued research in this area can be further conducted, which may lead to the development of strategic and technological framework to counter cyber terrorism

    IP spoofing attack and its countermeasures

    Full text link
    IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. It causes serious security problem in the cyber world, and is currently exploited widely in the information warfare. This paper at first introduces the IP spoofing attack through examples, technical issues and attacking types. Later its countermeasures are analysed in detail, which include authentication and encription, filtering and IP traceback. In particular, an IP traceback mechanism, Flexible Deterministic Packet Marking (FDPM) is presented. Since the IP spoofing problem can not be solved only by technology, but it also needs social regulation, the legal issues and economic impact are discussed in the later part.<br /

    Analysis of the Australian Government’s Security Strategy in Countering the Potential Threat of Terrorism Groups Through Cyber Terrorism Instruments

    Get PDF
    This paper discusses the strategies adopted by Australia in dealing with and overcoming the violent acts of Cyber Terrorism. Since the terrorist attack on September 11, 2001 in the United States, countries in the world have assumed the existence of terrorist groups as a global threat. Globalization has enabled the terrorist groups to transform conventional media in the cyber world into the infamous cyber terrorism which they use as a propaganda instrument for recruitment, providing logistics, training, forming paramilitaries, planning, carrying out attacks, hiding, and funding. This paper discussed the concept Australian national security which has developed beyond military. The concept of security according to the non-traditional approach is emphasized on the security interests of non-state actors (non-state actors). The present research used descriptive qualitative research, employing literature review or library research for data collection. The results found that the Australian government remains vigilant against cyberterrorism through law enforcement and international cooperation. The Australian government has stipulated the Criminal Code Act 1995 part 5.3 to fight against the acts of terrorism. In addition, to increase domestic skills in cyberspace, The Australian government also establish Australia's Cyber Security, through which the Australian Cyber Security Centre (ACSC) founded Joint Cyber Security Centres (JCSCs), AustCyber, the Australian Cyber Security Growth Network, and the Cyber Security Cooperative Research Centre. &nbsp;and. Australia is also committed to supporting and maintaining international mechanisms that promote stability and to working with partners on a voluntary basis to prevent and respond to threats, including cyber terrorism

    Cyberterrorism in the Context of Contemporary International Law

    Get PDF
    The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims are to be pursued by terrorists. The last two chapters concentrated on permissibility of individual response to cyberterrorism and applicability of this concept to jus in bello. The author noted that although generally self-defense in jus ad bellum is permitted, the controversial legal theories will have trouble adapting to the realities of cyberterrorism without international support. The author also highlights the paradoxical situation of two regimes on terrorism (archaic and conventional) coexisting during armed conflicts and its impact on cyberterrorism. Future convergence of these regimes on political level will require legal coordination of international organizations. This Article demonstrates why conventional terrorism by states should be ruled out as a viable concept in international law. at the same time the author argues in favor of the organization of the islamic conference suggestion to exclude freedom-fighters from the applicability of anti-terrorism conventions. major legal gaps identified in this article include preservation of prisoner of war privileges by conventional terrorists during wars, as well as legal discrepancy created by the conventions regime on terrorism which ensures freedom-fighters and cyber-guerillas receive less legal protection than military forces of a state despite their equal status under the additional protocol I

    The Legal Aspects of Cybercrime in Nigeria: An Analysis with the UK Provisions

    Get PDF
    Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effectively answer questions raised by shortcomings on the implementation of cybercrime legislations, and critically reviews various laws in Nigeria relating or closely related to cybercrime. This research will provide insight into current global cybercrime legislations and the shortfalls to their procedural enforcement; and further bares the cybercrime issues in Nigeria while analysing and proffering a critique to the provisions as provided in the recently enacted Nigerian Cybercrime (Prohibition and Prevention) Act 2015, in contradistinction to the existing legal framework in the United Kingdom and the other regional enactments like the Council of Europe Convention on Cybercrime, African Union Convention on Cybersecurity and Personal Data Protection 2014, and the ECOWAS Directive on Cybercrime 2011
    corecore