A Comprehensive Review of Cyber Terrorism in the Current Scenario

被引:0
|
作者
Vats, Prashant
机构
来源
2016 2ND IEEE INTERNATIONAL INNOVATIVE APPLICATIONS OF COMPUTATIONAL INTELLIGENCE ON POWER, ENERGY AND CONTROLS WITH THEIR IMPACT ON HUMANITY (CIPECH) | 2016年
关键词
Cyber Terrorism; Internet; Denial of Service (DOS); Electronic Surveillance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this research paper we have discussed about the phenomenon of Cyber terrorism and its growing impact in the current scenario. We have reviewed the laws and acts in various countries like US, UK, Canada, Australia and in India. We have also tried to review the Cyber terrorism from the aspect of the Indian IT Act 2000. We have carried out a comparative review of the various laws made by these individual countries to deal with the Cyber Terrorism. In the end we have concluded that The existing laws in various countries are not efficient to restrain the cyber crimes and, thus urging a need for implementing modifications through which these activities can be prevented. There is a need of international cooperation of nations to crack down the efficiency on the cyber crime.
引用
收藏
页码:277 / 281
页数:5
相关论文
共 50 条
  • [21] The economic impact of cyber terrorism
    Hua, Jian
    Bapna, Sanjay
    JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2013, 22 (02): : 175 - 186
  • [22] Drone Activity and Cyber Terrorism
    Shaffer, Ryan
    TERRORISM AND POLITICAL VIOLENCE, 2024, 36 (05) : 716 - 721
  • [23] Cyber-terrorism schools
    Schultz, E
    COMPUTERS & SECURITY, 2002, 21 (05) : 389 - 390
  • [24] The psychological effects of cyber terrorism
    Gross, Michael L.
    Canetti, Daphna
    Vashdi, Dana R.
    BULLETIN OF THE ATOMIC SCIENTISTS, 2016, 72 (05) : 284 - 291
  • [25] Cyber Terrorism And Cyber Law - Duties Of Service Providers
    Duggal, Pavan
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2016, 25 : 19 - 23
  • [26] COUNTERING TERRORISM WITH CYBER SECURITY
    Westby, Jody R.
    INTERNATIONAL SEMINARS ON NUCLEAR WAR AND PLANETARY EMERGENCIES - 36TH SESSION, 2007, : 279 - 294
  • [27] Cyber-terrorism in context
    Hinde, S
    COMPUTERS & SECURITY, 2003, 22 (03) : 188 - 192
  • [28] Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
    Ashok Yadav
    Atul Kumar
    Vrijendra Singh
    Artificial Intelligence Review, 2023, 56 : 12407 - 12438
  • [29] Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
    Yadav, Ashok
    Kumar, Atul
    Singh, Vrijendra
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (11) : 12407 - 12438
  • [30] Cyber Warfare and Cyber Terrorism (Know your Enemy)
    Qureshey, Zaki
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,