Cyberterrorism: content, forms and promising countermeasures

The purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures. The article highlights modern approaches to defining the content of cyber terrorism and its social and legal nature. This...

Full description

Saved in:
Bibliographic Details
Main Author: D. S. Melnyk
Format: Article
Language:Ukrainian
Published: Kharkiv National University of Internal Affairs 2023-10-01
Series:Bulletin of Kharkiv National University of Internal Affairs
Subjects:
Online Access:https://visnyk.univd.edu.ua/index.php/VNUAF/article/view/654
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832557380110385152
author D. S. Melnyk
author_facet D. S. Melnyk
author_sort D. S. Melnyk
collection DOAJ
description The purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures. The article highlights modern approaches to defining the content of cyber terrorism and its social and legal nature. This type of terrorism should be regarded as a socially dangerous politically motivated activity aimed at disrupting the critical information infrastructure of the State and thus creating a danger to human life and health or causing other serious consequences, provided that such actions were committed for terrorist purposes, or using cyberspace for other purposes of terrorist activities not directly related to terrorist acts. Typical features of cyber terrorism are described and a definition of its concept is proposed. The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.
format Article
id doaj-art-7506356139f844c985586d22a7efae58
institution Kabale University
issn 1999-5717
2617-278X
language Ukrainian
publishDate 2023-10-01
publisher Kharkiv National University of Internal Affairs
record_format Article
series Bulletin of Kharkiv National University of Internal Affairs
spelling doaj-art-7506356139f844c985586d22a7efae582025-02-03T05:16:52ZukrKharkiv National University of Internal AffairsBulletin of Kharkiv National University of Internal Affairs1999-57172617-278X2023-10-011023 (Part 2)14415810.32631/v.2023.3.37654Cyberterrorism: content, forms and promising countermeasuresD. S. Melnyk0Interagency Research and Science Centre, National Security and Defence Council of Ukraine, KyivThe purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures. The article highlights modern approaches to defining the content of cyber terrorism and its social and legal nature. This type of terrorism should be regarded as a socially dangerous politically motivated activity aimed at disrupting the critical information infrastructure of the State and thus creating a danger to human life and health or causing other serious consequences, provided that such actions were committed for terrorist purposes, or using cyberspace for other purposes of terrorist activities not directly related to terrorist acts. Typical features of cyber terrorism are described and a definition of its concept is proposed. The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.https://visnyk.univd.edu.ua/index.php/VNUAF/article/view/654cyber terrorismcomputer systems and networkscyberspacecountermeasures.
spellingShingle D. S. Melnyk
Cyberterrorism: content, forms and promising countermeasures
Bulletin of Kharkiv National University of Internal Affairs
cyber terrorism
computer systems and networks
cyberspace
countermeasures.
title Cyberterrorism: content, forms and promising countermeasures
title_full Cyberterrorism: content, forms and promising countermeasures
title_fullStr Cyberterrorism: content, forms and promising countermeasures
title_full_unstemmed Cyberterrorism: content, forms and promising countermeasures
title_short Cyberterrorism: content, forms and promising countermeasures
title_sort cyberterrorism content forms and promising countermeasures
topic cyber terrorism
computer systems and networks
cyberspace
countermeasures.
url https://visnyk.univd.edu.ua/index.php/VNUAF/article/view/654
work_keys_str_mv AT dsmelnyk cyberterrorismcontentformsandpromisingcountermeasures