Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause wide-scale damage. Cyberterrorism is often incorrectly perceived as encompassing all cybercrimes. However, cyberterrorism differs from cybercrime in various ways including motivation, attack goals, techniques and effects. Motivations for cyberterrorism, which is similar to terrorism in general, stem from religious, social and political views. Cyberterrorists generally would seek to have high impact in order to gain publicity for their cause, whereas cybercriminals often prefer to have their acts undetected in order to hide their financial theft, fraud or espionage. Therefore, there are various factors that drive the development of a cyberterrorist. This paper proposes a model for the development of cyberterrorism in order to show the various influential forces. The Cyberterrorism Life-Cycle (CLC) model presented in this paper is composed of five phases: Prepare, Acquaint, Choose, Execute, and Deter (PACED). In addition the paper looks at various factors, including social, practices, objectives, targets and countermeasures, which are mapped onto the PACED phases in order to show the interaction and dynamic nature during the life-cycle development.
Reference:
Veerasamy, N, Grobler, M and Von Solms, S. 2012. Towards a Cyberterrorism Life-Cycle (CLC) Model. Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2012 (IWSP 2012), Sandton, 16 August 2012, pp. 51-60
Veerasamy, N., Grobler, M., & Von Solms, S. (2012). Towards a Cyberterrorism Life-Cycle (CLC) Model. CSIR also School of Management, IT, and Governance, University of KwaZulu-Natal. http://hdl.handle.net/10204/6540
Veerasamy, Namosha, M Grobler, and S Von Solms. "Towards a Cyberterrorism Life-Cycle (CLC) Model." (2012): http://hdl.handle.net/10204/6540
Veerasamy N, Grobler M, Von Solms S, Towards a Cyberterrorism Life-Cycle (CLC) Model; CSIR also School of Management, IT, and Governance, University of KwaZulu-Natal; 2012. http://hdl.handle.net/10204/6540 .