Cyberterrorism: content, forms and promising countermeasures
The purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures. The article highlights modern approaches to defining the content of cyber terrorism and its social and legal nature. This...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
Kharkiv National University of Internal Affairs
2023-10-01
|
Series: | Bulletin of Kharkiv National University of Internal Affairs |
Subjects: | |
Online Access: | https://visnyk.univd.edu.ua/index.php/VNUAF/article/view/654 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832557380110385152 |
---|---|
author | D. S. Melnyk |
author_facet | D. S. Melnyk |
author_sort | D. S. Melnyk |
collection | DOAJ |
description | The purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures. The article highlights modern approaches to defining the content of cyber terrorism and its social and legal nature. This type of terrorism should be regarded as a socially dangerous politically motivated activity aimed at disrupting the critical information infrastructure of the State and thus creating a danger to human life and health or causing other serious consequences, provided that such actions were committed for terrorist purposes, or using cyberspace for other purposes of terrorist activities not directly related to terrorist acts.
Typical features of cyber terrorism are described and a definition of its concept is proposed. The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts.
The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism. |
format | Article |
id | doaj-art-7506356139f844c985586d22a7efae58 |
institution | Kabale University |
issn | 1999-5717 2617-278X |
language | Ukrainian |
publishDate | 2023-10-01 |
publisher | Kharkiv National University of Internal Affairs |
record_format | Article |
series | Bulletin of Kharkiv National University of Internal Affairs |
spelling | doaj-art-7506356139f844c985586d22a7efae582025-02-03T05:16:52ZukrKharkiv National University of Internal AffairsBulletin of Kharkiv National University of Internal Affairs1999-57172617-278X2023-10-011023 (Part 2)14415810.32631/v.2023.3.37654Cyberterrorism: content, forms and promising countermeasuresD. S. Melnyk0Interagency Research and Science Centre, National Security and Defence Council of Ukraine, KyivThe purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures. The article highlights modern approaches to defining the content of cyber terrorism and its social and legal nature. This type of terrorism should be regarded as a socially dangerous politically motivated activity aimed at disrupting the critical information infrastructure of the State and thus creating a danger to human life and health or causing other serious consequences, provided that such actions were committed for terrorist purposes, or using cyberspace for other purposes of terrorist activities not directly related to terrorist acts. Typical features of cyber terrorism are described and a definition of its concept is proposed. The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. The counteraction system may be based on the following: proper regulation of the concept of cyber terrorism in national legislation, criminalisation of acts of cyber terrorism and its components; enhancing the security and protection of critical information infrastructure; improving existing and applying new counteraction methods; improving cooperation in the field of combating cyber terrorism.https://visnyk.univd.edu.ua/index.php/VNUAF/article/view/654cyber terrorismcomputer systems and networkscyberspacecountermeasures. |
spellingShingle | D. S. Melnyk Cyberterrorism: content, forms and promising countermeasures Bulletin of Kharkiv National University of Internal Affairs cyber terrorism computer systems and networks cyberspace countermeasures. |
title | Cyberterrorism: content, forms and promising countermeasures |
title_full | Cyberterrorism: content, forms and promising countermeasures |
title_fullStr | Cyberterrorism: content, forms and promising countermeasures |
title_full_unstemmed | Cyberterrorism: content, forms and promising countermeasures |
title_short | Cyberterrorism: content, forms and promising countermeasures |
title_sort | cyberterrorism content forms and promising countermeasures |
topic | cyber terrorism computer systems and networks cyberspace countermeasures. |
url | https://visnyk.univd.edu.ua/index.php/VNUAF/article/view/654 |
work_keys_str_mv | AT dsmelnyk cyberterrorismcontentformsandpromisingcountermeasures |