Listing 1 - 10 of 1116 | << page >> |
Sort by
|
Choose an application
Choose an application
The war on terrorism has not been won, the author argues. Even though al-Qaeda's leadership has been largely destroyed and its organization disrupted, terrorist attacks take 12,000 lives annually worldwide, and jihadist terrorist ideology continues to spread. How ? Largely by going online and adopting a new method of organization. Terrorist structures, traditionally consisting of loose net cells, divisions, and subgroups, are ideally suited for flourishing on the Internet through websites, e-mail, chat rooms, e-groups, forums, virtual message boards, YouTube, Google Earth, and other outlets. Terrorist websites, including social media platforms, now number close to 10,000. This book addresses three major questions : why and how terrorism went online; what recent trends can be discerned - such as engaging children and women, promoting lone wolf attacks, and using social media; and what future threats can be expected, along with how they can be reduced or countered. To answer these questions, the book analyzes content from more than 9,800 terrorist websites, and the author describes their background and history, and surveys their content in terms of kind and intensity, the groups and prominent individuals involved, and effects. He highlights cyberterrorism against financial, governmental, and engineering infrastructure; efforts to monitor, manipulate, and disrupt terrorists' online efforts; and threats to civil liberties posed by ill-directed efforts to suppress terrorists' online activities as future, worrisome trends.
Choose an application
Nous vivons dans des sociétés de plus en plus numérisées où presque toutes les activités humaines dépendent du bon fonctionnement des technologies de l'information, en particulier d'Internet. Les États, les entreprises, les forces armées, les activistes, le crime organisé et même les particuliers apprécient l'avantage stratégique de l'arme numérique pour capter des données ou de l'argent, déstabiliser une organisation ou attenter à sa réputation. Tous sont ainsi irrigués par une informatique vulnérable aux cyberattaques. Nos vies personnelles et professionnelles se trouvent dorénavant menacées par ces nouvelles formes d'affrontement et dépendent de la cybersécurité. Laissée sans contraintes, celle-ci peut néanmoins aboutir au cauchemar d'une société de la surveillance totale. À chacun le devoir de s'informer sur les enjeux de la sécurité numérique. --Quatrième de couverture.
Choose an application
Choose an application
Cyberterrorism --- Cyberterrorism --- Prevention.
Choose an application
This book investigates the intersection of terrorism, digital technologies and cyberspace. Currently, the evolving academic field of cyber-terrorism is largely dominated by single perspective, technological, political, or sociological, texts. In contrast, this book utilises a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation to date. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes : 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace ?; 2) what threat do these various activities pose, and to whom ?; 3) how might these activities be prevented, deterred or responded to ? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism : from lone-actor terrorists, protest activities associated with 'hacktivist' groups and state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach which provides both a unique and valuable contribution to this subject matter.
Choose an application
Choose an application
Choose an application
"Hybrid threats represent one of the rising challenges to the safe and effective management of digital systems worldwide. The deliberate misuse or disruption of digital technologies has wide-ranging implications for fields as diverse as medicine, social media, and homeland security. Despite growing concern about cyber threats within many government agencies and international organizations, few strategies for the effective avoidance and management of threats or the prevention of the disruption they can cause have so far emerged. This book presents 17 papers from the NATO Advanced Research Workshop (ARW) Security and Resilience of Information Systems Affected by Hybrid Threats, held in Tallinn, Estonia, from 26 - 29 August 2018. This ARW focused on the development of strategies for the protection and recovery of systems affected by hybrid threats, and the benefits of those strategies under different disruption scenarios. The role of risk and resilience assessment in the information operational domain was also discussed. The aim of the workshop was to provide government officials as well as military and civilian practitioners with a better understanding of the options for enhancing the resilience of information systems. Offering an overview of resilience-based decision making through an approach that integrates the threats and dependencies related to infrastructural, informational, and social considerations, the book will be of interest to all those whose work involves the security of digital systems"--
Choose an application
Listing 1 - 10 of 1116 | << page >> |
Sort by
|