Dissertation/Thesis Abstract

Cyber terrorrism threats
by Gobran, Ashraf, M.S., Utica College, 2015, 48; 1588500
Abstract (Summary)

The purpose of this study is to explore the potential threats that are posed uniquely by cyber terrorism. While traditional terrorism has affected governmental policy, and inflicted physical damage to people and infrastructure across the world, computers and the Internet can allow for attacks as well. As terrorism groups begin to adapt to, and take advantage of - cyber tools and capabilities, the threat they pose will grow accordingly. While a terrorist is not able to directly kill people with cyber tools, the mayhem or social disruption that such attacks can cause, fit well with these organization's objectives. The anonymity of cyber space permits terrorist groups to plan and execute attacks without being identified immediately, if ever. In addition, the targets of cyber terrorists are often under prepared, and fairly vulnerable to various forms of cyber attacks. While these organizations may be aware of the risk posed by failing to adequately address cyber security deficiencies, their solutions are likely not sufficient to truly prevent cyber terrorism attacks. In order to discover technological advancements, efficient cyber security, and generally spread awareness on the subject, this study attempts to highlights existing threats, as well as an overview of what can be done to mitigate them.

Keywords: Intelligence, Cyber security, Professor Albert Orbanati

Indexing (document details)
Advisor: Orbinati, Albert
Commitee: Corbo, Lesile
School: Utica College
Department: Cybersecurity
School Location: United States -- New York
Source: MAI 54/04M(E), Masters Abstracts International
Source Type: DISSERTATION
Subjects: Information Technology, Computer science
Keywords: Cyber caliphate, Cyber terrorism, Cyber terrorism capabilities, Cyber terrorism history, Cyber terrorism targets, Cyber terrorism tools
Publication Number: 1588500
ISBN: 978-1-321-74098-1
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest