Cyber security countermeasures to combat cyber terrorism

Lachlan MacKinnon*, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick, Dimitrios Frangiskatos

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Abstract

In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.
Original languageEnglish
Title of host publicationStrategic intelligence management
Subtitle of host publicationnational security imperatives and information and communications technologies
EditorsBabak Akhgar, Simeon Yates
PublisherButterworth-Heinemann
Chapter20
Pages234-257
Number of pages24
ISBN (Print)9780124071919
DOIs
Publication statusPublished - 11 Mar 2013
Externally publishedYes

Fingerprint

Critical infrastructures
Terrorism
Malware

Cite this

MacKinnon, L., Bacon, L., Gan, D., Loukas, G., Chadwick, D., & Frangiskatos, D. (2013). Cyber security countermeasures to combat cyber terrorism. In B. Akhgar, & S. Yates (Eds.), Strategic intelligence management: national security imperatives and information and communications technologies (pp. 234-257). Butterworth-Heinemann. https://doi.org/10.1016/B978-0-12-407191-9.00020-X
MacKinnon, Lachlan ; Bacon, Liz ; Gan, Diane ; Loukas, Georgios ; Chadwick, David ; Frangiskatos, Dimitrios. / Cyber security countermeasures to combat cyber terrorism. Strategic intelligence management: national security imperatives and information and communications technologies. editor / Babak Akhgar ; Simeon Yates. Butterworth-Heinemann, 2013. pp. 234-257
@inbook{a80a8a059f4f4ba090ef78591b249160,
title = "Cyber security countermeasures to combat cyber terrorism",
abstract = "In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.",
author = "Lachlan MacKinnon and Liz Bacon and Diane Gan and Georgios Loukas and David Chadwick and Dimitrios Frangiskatos",
year = "2013",
month = "3",
day = "11",
doi = "10.1016/B978-0-12-407191-9.00020-X",
language = "English",
isbn = "9780124071919",
pages = "234--257",
editor = "Babak Akhgar and Simeon Yates",
booktitle = "Strategic intelligence management",
publisher = "Butterworth-Heinemann",

}

MacKinnon, L, Bacon, L, Gan, D, Loukas, G, Chadwick, D & Frangiskatos, D 2013, Cyber security countermeasures to combat cyber terrorism. in B Akhgar & S Yates (eds), Strategic intelligence management: national security imperatives and information and communications technologies. Butterworth-Heinemann, pp. 234-257. https://doi.org/10.1016/B978-0-12-407191-9.00020-X

Cyber security countermeasures to combat cyber terrorism. / MacKinnon, Lachlan; Bacon, Liz; Gan, Diane; Loukas, Georgios; Chadwick, David; Frangiskatos, Dimitrios.

Strategic intelligence management: national security imperatives and information and communications technologies. ed. / Babak Akhgar; Simeon Yates. Butterworth-Heinemann, 2013. p. 234-257.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Cyber security countermeasures to combat cyber terrorism

AU - MacKinnon, Lachlan

AU - Bacon, Liz

AU - Gan, Diane

AU - Loukas, Georgios

AU - Chadwick, David

AU - Frangiskatos, Dimitrios

PY - 2013/3/11

Y1 - 2013/3/11

N2 - In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

AB - In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

U2 - 10.1016/B978-0-12-407191-9.00020-X

DO - 10.1016/B978-0-12-407191-9.00020-X

M3 - Chapter

AN - SCOPUS:84895891465

SN - 9780124071919

SP - 234

EP - 257

BT - Strategic intelligence management

A2 - Akhgar, Babak

A2 - Yates, Simeon

PB - Butterworth-Heinemann

ER -

MacKinnon L, Bacon L, Gan D, Loukas G, Chadwick D, Frangiskatos D. Cyber security countermeasures to combat cyber terrorism. In Akhgar B, Yates S, editors, Strategic intelligence management: national security imperatives and information and communications technologies. Butterworth-Heinemann. 2013. p. 234-257 https://doi.org/10.1016/B978-0-12-407191-9.00020-X