Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 1

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  security policies
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Content available remote

Cyberterroryzm - fikcja czy realne zagrożenie?

100%
EN
Since the end of the last century “Cyber Pearl Harbour” has become more and more realistic scenario. Security specialists warn that highly developed countries, in particular the United States, are extremely vulnerable to cyberterrorists’ attacks. They claim that terrorists will rather choose a computer keyboard than bombs. That would mean an abandonment of terrorism in its classical form and would require a profound redefinement of security policies. Hence the main objective of the article is to examine whether cyberterrorism is a real threat to national and international security, or rather an invention of academics from different fields. For the better understanding of the topic the author defines and examines the interrelationship of the key issues, i.e. activism, hacktivism and cyber -terrorism. Their definition is necessary not least due to the fact that they are frequently misused and misinterpreted by the media. The second part of the article focuses on the use of modern technologies by terrorists. The subject of analysis are both the defects and the advantages of the use of the Internet as a means of international terror. In the third part of the article the author examines the first attempts of cyberterrorist attacks. A better understanding of the operations enables more accurate assessment of terrorist threats.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.