Explore chapters and articles related to this topic
Managing Technology Solutions for Port Facility Security
Published in Kenneth Christopher, Port Security Management, 2014
Security measures in the port facility must be developed to restrict access to information, particularly information stored in computer systems and devices used in furtherance of the port FSP. Cyberterrorism refers to electronic terrorism, or information war, or the use of IT by terrorists for the purpose of promoting a political agenda. The threats to national security associated with cyberterrorism are receiving intensified attention from the U.S. government. The FBI has provided funding for cybersecurity research. Information security is a widespread concern among IT professionals in both public and private sector organizations. Port facilities, which depend on complex computing architecture to network their surveillance, credentialing, access controls, communications and related systems, must seriously consider these increasing risks. A significant component of protecting the port facility’s IT network from infiltration and compromise must be in developing computer and information systems security protocols and educating employees to adhere to them.
Types of Cyberattacks
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
The main examples of cyberterrorism include the disruption of public utilities such as water supplies, electricity, healthcare, and other such systems. The coercive activities include the honey trap and other blackmailing tactics that can lead to the compromise on the governmental or security system information. All these activities can lead to economic system instability, explosion, plane crash, and other actions that cause serious injuries or death to a person or a group of people in a country. The terrorist attacks are normally destructive in nature to inflict huge losses to the planned targets rather than getting some money or economic benefits.
Malicious accounts detection from online social networks: a systematic review of literature
Published in International Journal of General Systems, 2021
Imen Ben Sassi, Sadok Ben Yahia
Cyberterrorism and hate speech belong both to violent activities (Chetty and Alathur 2018). Roughly speaking, hate speech is an extremist branch where the exchanged messages target a single individual, a nation, a gender, a religion, a race, a sexual orientation, or even a disability, to intimidate or hurt the target person. While cyberterrorism is the convergence of terrorism and cyberspace, as per (Denning 2000). Cyberterrorism is terrorism through the bias of internet and communication technologies. Nowadays, the number of accounts spreading cyberterrorism and hate speech keeps growing with the ideological, political, and religious support (Awan and Blakemore 2012). The social network of these malicious entities is particular since the relationships of its nodes are hidden to avoid detection. For this reason, researchers should pay more heed to profile-based, content-based, and behavioral features to detect these entities. The detection of this type of pathogenic accounts and its supporters can help to minimize damage and people discomfort, especially in crises like the racism and hate speech in OSNs against Chinese with the spreading of the coronavirus17 epidemic.