期刊文献+

略论网络恐怖主义 被引量:1

Cyberterrorism
下载PDF
导出
摘要 在界定恐怖主义时,普遍强调传达恐怖信息,造成社会恐慌。由于缺少胁迫和威吓要素,互联网上的黑客行为很难被界定为恐怖行为。不过在技术上借助互联网发动恐怖攻击并非毫无可能。越来越多的基础设施已经联网,一旦控制这些设施的系统被恐怖分子控制,他们很容易发动恐怖袭击,造成人员伤亡等毁灭性的后果。目前已经有通过攻击网站传达政治恐吓的先例。除此以外,已经出现恐怖组织借助互联网完成情报搜集、通信、宣传等多项任务。在物理上隔绝信息系统是防范网络恐怖活动的重要方法,但这也不能杜绝网络恐怖活动。而目前的国内法在打击网络恐怖主义方面还存在障碍,涉及国家主权争议,需要加以完善。 In the conventional definition of terrorism, the key elements are coercion and intimidation. Because of lack of them, the hacking, harass and annoy information could not be categorized as terrorism. Meanwhile, it is possible to attack online to the critical infrastructures. The increasing number of infrastructures connected to inter- net accompanies a new risk, once it is compromised by terrorists, it will inflict significant harm to persons or prop- erty by attacking the victim' s information systems. There have been incidents of convey political information by hacking. The terrorists also use cyberspace in furtherance of terrorism. The intelligence, communications, propa- ganda, etc. can be enhanced via internet. The physical air -gap to internet is useful, but by no means ideal way of counter - cyberterrorism. The domestic law is not adequate to combat cyber terrorism for the sovereignty issues.
作者 皮特·戈拉博斯基 迈克尔·斯托尔 陈波(译) Peter Grabosky Michael Stohl
出处 《河南警察学院学报》 2016年第4期55-61,共7页 Journal of Henan Police College
关键词 网络 恐怖主义 基础设施 法律防范 cyberspace terrorism critical infrastructures legal prevention
  • 相关文献

参考文献31

  • 1Stohl, Michael (1988). "Demystifying Terrorism : The Myths and Realities of Contemporary Political Terrorism," in Stohl, Mi- chael (ed.). The Politics of Terrorism. (3~ ed) New York: Marcel Decker, Inc.
  • 2Friedrich, Carl and Brzezinski, Zbigniew (1965) Totalitarian Dictatorship and Autocracy. Harvard University Press, Cam- bridge MA.
  • 3Stohl, Michael (1988). "Demystifying Terrorism : The Myths and Realities of Contemporary Political Terrorism," in Stohl, Mi- chael (ed.). The Politics of Terrorism. (3rd ed) New York: Marcel Decker, inc.
  • 4Denning, Dorothy (2000) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives, May 23, 2000 . http ://www. terrorism, com/documents/denning - testimony, shtml ( visited 7 January 2003).
  • 5Stohl, Michael (2012) "Don' t Confuse Me with the Facts: Knowledge Claims and Terrorism" Critical Studies on Terrorism, 5, 1, 31 -49.
  • 6http ://scobbs. blogspot, com. au/2011/06/cia - website - hack - recalls - early - days - of. html ( visited 20 August 2015 ).
  • 7Vatis, Michael (2001) Cyber Attacks During the War on Terrorism: A Predictive Analysis. Institute for Security Technology Studies, Dartmouth College, Hanover New Hampshire.
  • 8刘睿.“红色代码Ⅱ(Code RedⅡ)”蠕虫病毒发作机制和解决方案[J].计算机系统应用,2002,11(9):47-50. 被引量:1
  • 9刘利,郑华,邹莹.分布式拒绝服务攻击及防范方法研究[J].网络安全技术与应用,2006(5):29-31. 被引量:3
  • 10CNN (1998) Teen hacker faces federal charges: Caused computer crash that disabled Massachusetts airport http://www, cnn. com/TECH/computing/9803/18/juvenile, hacker/. ( Visited 20 August 2015 ).

二级参考文献2

  • 1Haining Wang,Danlu Zhang,Kang G.Shin,Detecting SYN Flood-ing Attacks[]..2002
  • 2Abraham Yaar,Adrian Perrig,Dawn Song.Pi:A Path Identifica-tion Mechani- sm to Defend against DDoS Attacks[]..2003

共引文献2

同被引文献13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部