Spelling suggestions: "subject:"counterterrorism."" "subject:"bioterrorism.""
1 |
CLC - cyberterrorism life cycle modelVeerasamy, Namosha 13 October 2014 (has links)
Ph.D. (Computer Science) / The rise of technology has brought with it many benefits but also the potential for great dangers. In particular, Information Communication Technology (ICT) is involved in many facets of life-influencing systems, which range from power plants to airports. Terrorists are now realising the great possibilities of interfering with critical infrastructure. Remote access, reduced costs, automation, replication, speed, direct effect, varied targets and anonymity are all benefits that make attacking computers and networks in cyberspace an attractive solution. ICT could thus serve as a powerful instrument to advance political and ideological viewpoints. The ICT landscape now faces an emerging threat in the form of cyberterrorists. However, it is important not to incorrectly perceive ordinary cyber attacks as cyberterrorism. Cyberterrorism is different from cybercrime in that is has differing motives, attack goals, techniques and intended effects. The motivation for cyberterrorism largely stems from political and ideological views (religious, social activism, retributional). Cyber attacks are mainly driven by financial theft, fraud or espionage, whereas cyberterrorism aims to create publicity for a cause and leave a high impact. In this study, a Cyberterrorism Life Cycle (CLC) Model is developed in order to demonstrate the various factors that lead to the establishment and growth of cyberterrorism. The model depicts the various strategic and technical issues that are relevant to the field. Overall, this model aims to structure the dynamic interaction of the behavioural and technological factors that influence the development of cyberterrorism. Throughout the research, various factors that are influential to cyberterrorism are investigated. The research follows a systematic approach of revealing various underlying issues and thereafter compiling the holistic CLC model to depict these critical issues. Part 1 introduces cyberterrorism and provides the background to the field by discussing incidents and example groups. Initially, the concept of cyberterrorism is explored and the proposed definition tested. Part 2 looks at investigating cyberterrorism more deeply. A conceptual framework is presented that introduces the most pertinent factors in the field of cyberterrorism. Next, the traditional and innovative use of the Internet to carry out and support terrorism is explored. Then, the study addresses the determination of additional social factors using Partial Least Squares Path Modelling. In Part 3, the field of cyberterrorism is more intensely studied. Cyberterrorism is mapped to the Observe-Orient- Decide-Act (OODA) loop, which will form the basis of the CLC model. Thereafter, the most influential concepts essential to the field of cyberterrorism are applied in order to classify attacks as cyberterrorism using ontologies. Furthermore, in Part 3, countermeasures are discussed to look at ways to combat cyberterrorism. Part 4 forms the crux of the research. The CLC model is presented as a structured representation of the various influential factors relevant to cyberterrorism. Thereafter, the CLC model is simulated to show the field more dynamically. Overall, the CLC model presented in this study aims to show the interaction of the various strategic, behavioural and technical issues. The CLC model can help elucidate the reasons for attraction into extremist groups and how attacks are carried out.
|
2 |
Cyberwarfare as an element of PRC national power and its implications for U. S. national security /Mazanec, Brian M., January 1900 (has links)
Thesis (M.S.)--Missouri State University, 2008. / "December 2008." Includes bibliographical references (leaves 91-97). Also available online.
|
3 |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercisesSherman, Michael A. 09 1900 (has links)
Approved for public release; distribution is unlimited / An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises. / Major, United States Marine Corps
|
4 |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises /Sherman, Michael A. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis Advisor(s): Cynthia E. Irvine, J.D. Fulp. Includes bibliographical references (p. 155-159). Also available online.
|
5 |
Network-layer selective security /Deccio, Casey T., January 2004 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2004. / Includes bibliographical references (p. 51-54).
|
6 |
Analysis of attacks on Web based applicationsMiller, Brandon Scott. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2009. / Title from document title page. Document formatted into pages; contains vii, 59 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 56-59).
|
7 |
Widespread Internet attacks defense-oriented evolution and countermeasures /Wang, Xun, January 2007 (has links)
Thesis (Ph. D.)--Ohio State University, 2007. / Title from first page of PDF file. Includes bibliographical references (p. 151-162).
|
8 |
Cyberterrorists: Their Communicative Messages And The Effect On TargetsMinei, Elizabeth 01 January 2009 (has links)
This qualitative study provides a semiotic perspective on cyberterrorism and its opportunity to cause maximal damage while using terrorist propaganda. The very definition of cyberterrorism refers to Internet use, technology, and computer-based networks against critical infrastructures. The application of Stamper's Semiotic Ladder - morphological, empirical, syntactical, semantic, pragmatic and social world - to the various methods of propaganda utilized by cyberterrorists will uncover aspects on the transition from traditional to modern methods of attack, cyberterrorist communication, and the recruitment of new members to their cause. Additionally, this research focused on the role of the media in the equation of planning by propaganda to the fruition of an attack. Interviews were collected from ten participants during 30-60 minute segments. Based on the data, five themes emerged: (1) Acknowledgement of the Existence of Cyberterrorism, (2) Postmodern Propaganda and Publicity, (3) Detrimental Effects on Targets, (4) Media Implications , and (5) Communicative Messages. This provides readers with an organized order to the data and provides a way to progressively detail cyberterrorism, with a specific focus on the actual effects of their semiotic intents on targets, on the public, and on the world at large or what is being conveyed. Ultimately, the themes that emerged follow Stamper's Semiotic Ladder, starting with surface level understanding of cyberterrorism and work up to the global impact of cyberterrorism on various aspects of culture, beliefs, and expectations.
|
9 |
Methodologies for power analysis attacks on hardware implementations of AES /Smith, Kenneth James. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 96-97).
|
10 |
VTAC : virtual terrain assisted impact assessment for cyber attacks /Argauer, Brian John. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 96-98).
|
Page generated in 0.0799 seconds