Cyberattacks, Cybercrime and Cyberterrorism

Cyberattacks, Cybercrime and Cyberterrorism

Saurabh Ranjan Srivastava, Sachin Dube
ISBN13: 9781522541004|ISBN10: 1522541004|EISBN13: 9781522541011
DOI: 10.4018/978-1-5225-4100-4.ch010
Cite Chapter Cite Chapter

MLA

Srivastava, Saurabh Ranjan, and Sachin Dube. "Cyberattacks, Cybercrime and Cyberterrorism." Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., IGI Global, 2018, pp. 162-183. https://doi.org/10.4018/978-1-5225-4100-4.ch010

APA

Srivastava, S. R. & Dube, S. (2018). Cyberattacks, Cybercrime and Cyberterrorism. In G. Shrivastava, P. Kumar, B. Gupta, S. Bala, & N. Dey (Eds.), Handbook of Research on Network Forensics and Analysis Techniques (pp. 162-183). IGI Global. https://doi.org/10.4018/978-1-5225-4100-4.ch010

Chicago

Srivastava, Saurabh Ranjan, and Sachin Dube. "Cyberattacks, Cybercrime and Cyberterrorism." In Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., 162-183. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4.ch010

Export Reference

Mendeley
Favorite

Abstract

This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism.' Contrasting to non-lethal terms such as ‘internet vandalism' and ‘hacktivism,' cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping our eyes open, establishments can go a long way to avert cyberterror attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.