Cyberterrorism in the Cloud

This chapter addresses the relationship between cyberterrorism and Cloud computing, seeking to establish a better appreciation of the nature and likelihood of such terrorism. The defining characteristics of terrorism and cyberterrorism are explored, and a contrast is drawn between cyberterrorism and...

Full description

Saved in:
Bibliographic Details
Published inSecurity, Privacy, and Digital Forensics in the Cloud pp. 217 - 237
Main Authors Cartwright, Barry, Weir, George R. S, Frank, Richard
Format Book Chapter
LanguageEnglish
Published Singapore John Wiley & Sons Singapore Pte. Ltd 15.04.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This chapter addresses the relationship between cyberterrorism and Cloud computing, seeking to establish a better appreciation of the nature and likelihood of such terrorism. The defining characteristics of terrorism and cyberterrorism are explored, and a contrast is drawn between cyberterrorism and terrorist use of cyberspace. We ask whether any meaningful incidents of cyberterrorism have occurred to date, and offer a definition of cyberterrorism against which future putative incidents may be gauged. The use of cyberspace by terrorists is considered, along with other factors that might render Cloud‐based services more vulnerable to terrorist activities. In this context, we explore the nexus between cyberlaw and cyberterrorism, with focus upon jurisdictional issues and issues that arise when dealing with politically‐charged, transnational events. To conclude, we contemplate the prospects for future directions in cyberterrorism, and the prospects that the Cloud might facilitate or become a target of such attacks.
ISBN:1119053285
9781119053286
DOI:10.1002/9781119053385.ch11