Cyberterrorism in the Cloud
This chapter addresses the relationship between cyberterrorism and Cloud computing, seeking to establish a better appreciation of the nature and likelihood of such terrorism. The defining characteristics of terrorism and cyberterrorism are explored, and a contrast is drawn between cyberterrorism and...
Saved in:
Published in | Security, Privacy, and Digital Forensics in the Cloud pp. 217 - 237 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Singapore
John Wiley & Sons Singapore Pte. Ltd
15.04.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This chapter addresses the relationship between cyberterrorism and Cloud computing, seeking to establish a better appreciation of the nature and likelihood of such terrorism. The defining characteristics of terrorism and cyberterrorism are explored, and a contrast is drawn between cyberterrorism and terrorist use of cyberspace. We ask whether any meaningful incidents of cyberterrorism have occurred to date, and offer a definition of cyberterrorism against which future putative incidents may be gauged. The use of cyberspace by terrorists is considered, along with other factors that might render Cloud‐based services more vulnerable to terrorist activities. In this context, we explore the nexus between cyberlaw and cyberterrorism, with focus upon jurisdictional issues and issues that arise when dealing with politically‐charged, transnational events. To conclude, we contemplate the prospects for future directions in cyberterrorism, and the prospects that the Cloud might facilitate or become a target of such attacks. |
---|---|
ISBN: | 1119053285 9781119053286 |
DOI: | 10.1002/9781119053385.ch11 |