Cyberterrorism: criminological characteristics and qualification

Мұқаба

Толық мәтін

Ашық рұқсат Ашық рұқсат
Рұқсат жабық Рұқсат берілді
Рұқсат жабық Тек жазылушылар үшін

Аннотация

The article addresses the problem of the problem of cyberterrorist attacks on information resources and information infrastructure. The author gives a criminological description of various types of cyberterrorism and offers options for qualifying crimes of a cyberterrorist nature. Based on foreign experience, various models and main directions of countering cyberterrorism are substantiated.

Толық мәтін

Рұқсат жабық

Авторлар туралы

Vladislav Krasinsky

Main Department of Regional Security of the Moscow Region

Email: krasinskijvv@fedsfm.ru
Russian Federation, Moscow Region, Krasnogorsk

Vladislav Mashko

Russian State University for the Humanities

Хат алмасуға жауапты Автор.
Email: kmbiai@yandex.ru
Russian Federation, Moscow

Әдебиет тізімі

  1. Vasenin V.A. Information security and computer terrorism [Electronic resource]. URL: www. crime-research.ru (in Russ.).
  2. Gavrilov Yu. V., Smirnov L.V. Modern terrorism: essence, typology, problems of counteraction. M., 2003 (in Russ.).
  3. Golubev V.A. Cyberterrorism – a threat to national security [Electronic resource]. URL: www.crime-research.ru (in Russ.).
  4. Grishin S.E. The formation of a cybersecurity culture in society is an urgent task of our time // Herald of the Saratov State Socio-Economic University. 2011. No. 4. P. 170–173 (in Russ.).
  5. Kapitonova E.A. Features of cyberterrorism as a new kind of terrorist act // News of higher educational institutions. Volga Region. Social sciences. 2015. No. 2. P. 29 - 44 (in Russ.).
  6. Kashepov V.P. Retraining of criminal acts when changing the criminal law // Journal of Russian law. 2014. No. 4. P. 8 (in Russ.).
  7. Kupriyanov A. India in the era of cyberwar. URL: http://russiancouncil.ru/analytics-and-comments/analytics/indiya-v-epokhu-kibervoyn (in Russ.).
  8. Sarkisyan A.J. Criminological characteristics of crimes committed in the field of information and communication technologies // Russ. Investigator. 2019. No. 3. P. 54 - 59 (in Russ.).
  9. Solomatina E.S. Prospects for the development of legislation in the field of combating cyberterrorism // Law and Law. 2009. No. 1. P. 47, 48 (in Russ.).
  10. Chekunov I.G. Cybercrime: concept and classification // Russ. Investigator. 2012. No. 2. P. 37 - 44 (in Russ.).
  11. Chikhachev A. France: Cyber Republic on the march. URL: http://russiancouncil.ru/analytics-and-comments/analytics/frantsiya-kiberrespublika-na-marshe (in Russ.).
  12. Sharikov P.A. Evolution of American cybersecurity policy // World economy and international relations. 2019. Vol. 63. No. 10. P. 51–58 (in Russ.).
  13. Canetti D., Gross M., Waismel-Manor I. et al. How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks // Cyberpsychology, Behavior, and Social Networking. 2017. Vol. 20. No. 2. Р. 72 - 77.
  14. Charlton C. Armchar warriors. Terrifying new generation of ‘cybernative’ ISIS terrorists could target ‘Facebook and West’s energy grids’ in a bid to cause mass panic and mayhem [Electronic resource]. - Access mode: URL: https://www.thesun.co.uk/news/2643688/cyber-terrorism-attacks-threat-level-isis-facebook-energy (accessed: 25.12.2021).
  15. Choi J. 8 in 10 say cyberterrorism is top potential threat: Gallup [Electronic resource]. – Access mode: URL: https://thehill.com/policy/cybersecurity/544274-8-in-10-say-cyberterrorism-is-top-potential-threat-gallup (accessed: 25.12.2021).
  16. Cyberterrorism / National Conference of State Legislatures [Electronic resource]. – Access mode: URL: http://www.ncsl.org/programs/lis/CIP/cyberterrorism.htm (accessed: 12.04.2022).
  17. Fowler M. Cyber terrorism: Sci-Fi fantasy or legitimate threat? [Electronic resource]. - Access mode: URL: https://thehill.com/opinion/cybersecurity/578868-cyber-terrorism-sci-fi-fantasy-or-legitimate-threat (accessed: 24.12.2021).
  18. Holt T.J., Bossler A.M., Seigfried-Spellar K.C. Cybercrime and digital forensics. NY, 2017.
  19. Keren L.G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti. Cyberattacks, cyber threats, and attitudestoward cybersecurity policies // Journal of Cybersecurity. 2021. Vol. 7. Issue 1.
  20. “Killing Lists” – The Evolution of Cyber Terrorism? [Electronic resource]. – Access mode: URL: https://www.ict.org.il/Article/1793/killing-lists-the-evolution-of-cyber-terrorism#gsc.tab=0 (accessed: 25.12.2021).
  21. Ozeren S. Global Response to Cyberterrorism and Cybercrime: A Matrix for International Cooperation and Vulnerability Assessment: Dissertation Prepared for the Degree of Doctor of Philosophy. University of North Texas, 2005. P. 7.
  22. Responses to Cyber Terrorism / NATO Science for Peace and Security Series / Centre of Excellence Defence Against Terrorism, Ankara, Turkey. 2008.
  23. Taylor R.W., Caeti T.J., Loper D.K. et al. Digital Crime and Digital Terrorism. Pearson / Prentice Hall, 2006. P. 20.
  24. Tesauro L. The Role Al Qaeda Plays in Cyberterrorism [Electronic resource]. – Access mode: URL: https://smallwarsjournal.com/jrnl/art/role-al-qaeda-plays-cyberterrorism (accessed: 25.12.2021).
  25. Saurabh Ranjan Srivastava and Sachin Dube. Cyberattacks, Cybercrime and Cyberterrorism // Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications // Information Resources Management Association (USA). 2020. Р. 931 - 963.
  26. Wilson C. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress, CRS Report RJ32114 (Washington, D.C.: Library of Congress, Congressional Research Service, 17 October 2003). P. 4.

© Russian Academy of Sciences, 2023

Осы сайт cookie-файлдарды пайдаланады

Біздің сайтты пайдалануды жалғастыра отырып, сіз сайттың дұрыс жұмыс істеуін қамтамасыз ететін cookie файлдарын өңдеуге келісім бересіз.< / br>< / br>cookie файлдары туралы< / a>