TYPES OF CYBERCRIME
Cyber-Terrorism
Cyber-terrorism is distinguished from other acts of commercial crime or incidents of hacking by its severity. Attacks against computer networks or the information stored therein which result in "violence against persons or property, or at least cause enough harm to generate fear" are to be considered cyber-terrorism attacks according to congressional testimony from Georgetown University professor Dorothy Denning. "Attacks that disrupt nonessential services or that are mainly a costly nuisance" are not classified as cyber-terrorist attacks by her definition. Recent world events have resulted in efforts to minimize cyber-terrorist attacks including the appointment by President Bush of Richard Clarke as special advisor to the president for cyberspace security.
Recommended Links:
Cyber Security Survey - June 25,2002 IT pros say the U.S. is at risk of a major cyber attack, and the government is not adequately prepared to face that attack.
Business Software Alliance Security website BSA's member companies build many of the networks that power the world's information infrastructures -- including the Internet - and they develop the leading security tools used to protect computer networks against cyber-crimes and attacks.
The Center for the Study of Technology and Society Excellent links on cyber-terrorism.
Dartmouth College: Institute for Security Technology Studies ISTS is a principal national center for counter-terrorism technology research, development and assessment and is funded by the US Department of Justice.
Information Warfare Database Joint site presented by the Terrorist Research Center and Georgetown University on information warfare.
Information Warfare Excellent links on cyber-terrorism.
International Center for Security Analysis ICSA is the consultancy research arm of the Department of War Studies, King's College London.
Department of Homeland Security The Department of Homeland Security serves as the U.S. government's focal point for threat assessment, warning, investigation, and response for threats or attacks against our critical infrastructures.
|