Cyberterrorism: criminological characteristics and qualification

封面

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

The article addresses the problem of the problem of cyberterrorist attacks on information resources and information infrastructure. The author gives a criminological description of various types of cyberterrorism and offers options for qualifying crimes of a cyberterrorist nature. Based on foreign experience, various models and main directions of countering cyberterrorism are substantiated.

全文:

受限制的访问

作者简介

Vladislav Krasinsky

Main Department of Regional Security of the Moscow Region

Email: krasinskijvv@fedsfm.ru
Russian Federation, Moscow Region, Krasnogorsk

Vladislav Mashko

Russian State University for the Humanities

编辑信件的主要联系方式.
Email: kmbiai@yandex.ru
Russian Federation, Moscow

参考

  1. Vasenin V.A. Information security and computer terrorism [Electronic resource]. URL: www. crime-research.ru (in Russ.).
  2. Gavrilov Yu. V., Smirnov L.V. Modern terrorism: essence, typology, problems of counteraction. M., 2003 (in Russ.).
  3. Golubev V.A. Cyberterrorism – a threat to national security [Electronic resource]. URL: www.crime-research.ru (in Russ.).
  4. Grishin S.E. The formation of a cybersecurity culture in society is an urgent task of our time // Herald of the Saratov State Socio-Economic University. 2011. No. 4. P. 170–173 (in Russ.).
  5. Kapitonova E.A. Features of cyberterrorism as a new kind of terrorist act // News of higher educational institutions. Volga Region. Social sciences. 2015. No. 2. P. 29 - 44 (in Russ.).
  6. Kashepov V.P. Retraining of criminal acts when changing the criminal law // Journal of Russian law. 2014. No. 4. P. 8 (in Russ.).
  7. Kupriyanov A. India in the era of cyberwar. URL: http://russiancouncil.ru/analytics-and-comments/analytics/indiya-v-epokhu-kibervoyn (in Russ.).
  8. Sarkisyan A.J. Criminological characteristics of crimes committed in the field of information and communication technologies // Russ. Investigator. 2019. No. 3. P. 54 - 59 (in Russ.).
  9. Solomatina E.S. Prospects for the development of legislation in the field of combating cyberterrorism // Law and Law. 2009. No. 1. P. 47, 48 (in Russ.).
  10. Chekunov I.G. Cybercrime: concept and classification // Russ. Investigator. 2012. No. 2. P. 37 - 44 (in Russ.).
  11. Chikhachev A. France: Cyber Republic on the march. URL: http://russiancouncil.ru/analytics-and-comments/analytics/frantsiya-kiberrespublika-na-marshe (in Russ.).
  12. Sharikov P.A. Evolution of American cybersecurity policy // World economy and international relations. 2019. Vol. 63. No. 10. P. 51–58 (in Russ.).
  13. Canetti D., Gross M., Waismel-Manor I. et al. How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks // Cyberpsychology, Behavior, and Social Networking. 2017. Vol. 20. No. 2. Р. 72 - 77.
  14. Charlton C. Armchar warriors. Terrifying new generation of ‘cybernative’ ISIS terrorists could target ‘Facebook and West’s energy grids’ in a bid to cause mass panic and mayhem [Electronic resource]. - Access mode: URL: https://www.thesun.co.uk/news/2643688/cyber-terrorism-attacks-threat-level-isis-facebook-energy (accessed: 25.12.2021).
  15. Choi J. 8 in 10 say cyberterrorism is top potential threat: Gallup [Electronic resource]. – Access mode: URL: https://thehill.com/policy/cybersecurity/544274-8-in-10-say-cyberterrorism-is-top-potential-threat-gallup (accessed: 25.12.2021).
  16. Cyberterrorism / National Conference of State Legislatures [Electronic resource]. – Access mode: URL: http://www.ncsl.org/programs/lis/CIP/cyberterrorism.htm (accessed: 12.04.2022).
  17. Fowler M. Cyber terrorism: Sci-Fi fantasy or legitimate threat? [Electronic resource]. - Access mode: URL: https://thehill.com/opinion/cybersecurity/578868-cyber-terrorism-sci-fi-fantasy-or-legitimate-threat (accessed: 24.12.2021).
  18. Holt T.J., Bossler A.M., Seigfried-Spellar K.C. Cybercrime and digital forensics. NY, 2017.
  19. Keren L.G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti. Cyberattacks, cyber threats, and attitudestoward cybersecurity policies // Journal of Cybersecurity. 2021. Vol. 7. Issue 1.
  20. “Killing Lists” – The Evolution of Cyber Terrorism? [Electronic resource]. – Access mode: URL: https://www.ict.org.il/Article/1793/killing-lists-the-evolution-of-cyber-terrorism#gsc.tab=0 (accessed: 25.12.2021).
  21. Ozeren S. Global Response to Cyberterrorism and Cybercrime: A Matrix for International Cooperation and Vulnerability Assessment: Dissertation Prepared for the Degree of Doctor of Philosophy. University of North Texas, 2005. P. 7.
  22. Responses to Cyber Terrorism / NATO Science for Peace and Security Series / Centre of Excellence Defence Against Terrorism, Ankara, Turkey. 2008.
  23. Taylor R.W., Caeti T.J., Loper D.K. et al. Digital Crime and Digital Terrorism. Pearson / Prentice Hall, 2006. P. 20.
  24. Tesauro L. The Role Al Qaeda Plays in Cyberterrorism [Electronic resource]. – Access mode: URL: https://smallwarsjournal.com/jrnl/art/role-al-qaeda-plays-cyberterrorism (accessed: 25.12.2021).
  25. Saurabh Ranjan Srivastava and Sachin Dube. Cyberattacks, Cybercrime and Cyberterrorism // Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications // Information Resources Management Association (USA). 2020. Р. 931 - 963.
  26. Wilson C. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress, CRS Report RJ32114 (Washington, D.C.: Library of Congress, Congressional Research Service, 17 October 2003). P. 4.

版权所有 © Russian Academy of Sciences, 2023
##common.cookie##