Cyber-terrorism: problems of counteraction
Globalization of information processes has not only opened up new opportunities for the progressive development of humanity, but also caused a number of qualitatively new global threats, including the vulnerability of the international community to criminal abuse in the field of information security.
The urgency of countering terrorist threats, based on new technologies, causes the fact that the possible terrorist use of the Internet resources are constantly in the field of view of the competent authorities of CIS countries.
This definition is consistent with the recommendations of UN experts. In their view, the term "cyber crime" means any crime that can be committed through a computer system or network, as part of a computer system or network or against a computer system or network. Thus, a cybercrime can be attributed any crime committed in an electronic environment. [4] The crime committed in cyberspace - is guilty of unlawful interference with the operation of computers, computer software, computer networks, unauthorized modification of computer data, as well as other illegal public dangerous acts committed on or through the computer, networking and software.
The widespread use of personal computers, as well as based on these computer networks, increasing the volume of information, the gradual replacement of paper-based document processing, expanding the range of users has led to qualitatively new possibilities of unauthorized access to confidential information and data information networks to their high vulnerability.
In our opinion, these four types of crimes are the actual "computer", the other - it is either connected to a computer (computer-related), or committed by a computer (computer-facilitated) crime. These include:
• a crime in which the computer is a tool (electronic theft, fraud, etc.);
• act in the commission of which the computer is an intelligent agent (eg, placement on child pornography sites, information, inciting national, racial or religious hatred, etc.).
There was quite a new phenomenon in the field of information technologies such as "computer or cyber-terrorism." In this particular danger of cyber-terrorism is that "in order to achieve their criminal aims terrorists can attack the information environment, in particular, the computer control system whole branches of industry, defense, critical infrastructure." A clear illustration of this thesis is the June (2007), a cyber attack on the Pentagon, which resulted in out of order more than 1500 computers.
Globalization of information processes has not only opened up new opportunities for the progressive development of humanity, but also caused a number of qualitatively new global threats, including the vulnerability of the international community to criminal abuse in the field of information security.
The urgency of countering terrorist threats, based on new technologies, causes the fact that the possible terrorist use of the Internet resources are constantly in the field of view of the competent authorities of CIS countries.
This definition is consistent with the recommendations of UN experts. In their view, the term "cyber crime" means any crime that can be committed through a computer system or network, as part of a computer system or network or against a computer system or network. Thus, a cybercrime can be attributed any crime committed in an electronic environment. [4] The crime committed in cyberspace - is guilty of unlawful interference with the operation of computers, computer software, computer networks, unauthorized modification of computer data, as well as other illegal public dangerous acts committed on or through the computer, networking and software.
The widespread use of personal computers, as well as based on these computer networks, increasing the volume of information, the gradual replacement of paper-based document processing, expanding the range of users has led to qualitatively new possibilities of unauthorized access to confidential information and data information networks to their high vulnerability.
In our opinion, these four types of crimes are the actual "computer", the other - it is either connected to a computer (computer-related), or committed by a computer (computer-facilitated) crime. These include:
• a crime in which the computer is a tool (electronic theft, fraud, etc.);
• act in the commission of which the computer is an intelligent agent (eg, placement on child pornography sites, information, inciting national, racial or religious hatred, etc.).
There was quite a new phenomenon in the field of information technologies such as "computer or cyber-terrorism." In this particular danger of cyber-terrorism is that "in order to achieve their criminal aims terrorists can attack the information environment, in particular, the computer control system whole branches of industry, defense, critical infrastructure." A clear illustration of this thesis is the June (2007), a cyber attack on the Pentagon, which resulted in out of order more than 1500 computers.
No comments:
Post a Comment