This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada.
With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
From the book reviews:
"The volume is thoroughly edited with all the necessary useful additions to the chapters, such as an informative preface, bullets inserted into the chapters with key points, extensive references in each chapter, a list of acronyms, a glossary, and a good index. It may provide a useful general introduction to the area of cyberterrorism for civil servants and students in public policy ... ." (L.-F. Pau, Computing Reviews, December, 2014)
"The volume is thoroughly edited with all the necessary useful additions to the chapters, such as an informative preface, bullets inserted into the chapters with key points, extensive references in each chapter, a list of acronyms, a glossary, and a good index. It may provide a useful general introduction to the area of cyberterrorism for civil servants and students in public policy ... ." (L.-F. Pau, Computing Reviews, December, 2014)