SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Determining Extremist Organisations’ Likelihood of Conducting Cyber Attacks

1 min read
in Career, Document, Paper

 

Abstract

The 2007 cyber attacks against Estonia were a prime example of how hackers can operate within a nation’s cyber domain. Looking at today’s cyber landscape, it would seem that the tools needed for an offensive cyber operational capability are readily available to a properly motivated extremist organisation. Reports and articles about hacking and cyber security from think tanks and popular publications focused on technology and business tend to reinforce such a perception. In the nexus of cyber and physical and especially in the context terrorism, given the availability of offensive cyber capability, it is unclear why more extremist organisations are not engaging in offensive cyber operations. To investigate this anomaly this study employed a structured expert elicitation to identify a set of variables that would assist in determining an extremist organisation’s likelihood of choosing to engage in cyber attacks. The results revealed that while there are points of convergence as well as extreme divergences in the assessment, level of Internet presence, access to human resources, and human resource available (internally to the organisation) were assessed to have the most explanatory power for determining an extremist organisation’s likelihood for engaging in offensive cyber operations.

 

GET DOCUMENT

Related

Tags: DocumentsPaperTerrorist GroupTerrorist Group Paper
4
VIEWS
ADVERTISEMENT

Related Posts

PCI POINT-TO-POINT ENCRYPTION (P2PE) ASSESSOR

PCI POINT-TO-POINT ENCRYPTION (P2PE) ASSESSOR

May 20, 2022
PCI FORENSIC INVESTIGATOR (PFI)

PCI FORENSIC INVESTIGATOR (PFI)

May 20, 2022
3DS ASSESSOR QUALIFICATION

3DS ASSESSOR QUALIFICATION

May 20, 2022
INTERNAL SECURITY ASSESSOR (ISA)

INTERNAL SECURITY ASSESSOR (ISA)

May 20, 2022

More Articles

Alerts

Scammers Are Using Fake Job Ads to Steal People’s Identities

October 27, 2021
Book

Data Privacy & Compliance Guidebook: GDPR, CCPA…

March 18, 2022
Incidents

1 Million Texans Potentially Impacted By Data Breach

March 18, 2022

Thales Luna Network HSMs – Hardware

April 15, 2022
Book

Deep Faked

December 6, 2020
Tool

SABSA Method and Framework

March 7, 2022

TestGuild Security Testing Podcast

April 1, 2022

Password to incorrect…

October 17, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....