Iran US Relations Based on Understanding Cyber Terrorism:

Authors

  • admin admin

Keywords:

Understanding, Cyber Crime, Telecommunication System, Cyber War etc.

Abstract

The range of the attack for Electricity Companies to cut off the electricity
of their specific area or the whole state, they are capable to manage the
traffic systems of the state, to manage the broader mediums and propagate
their massages, to manage the military warfare weapons like missiles, radar
system, air craft, and other communication systems, Train traffic system,
Air traffic system, Passenger airplane, destroyed the national database
system like CNIC and Passport, Satellite system, can destroyed the state
Telecommunication system or hack the system, It can transfer the cash from
the banks accounts, they can easily have full access to control or mange the
codes of WMS equipment of massive chaos and misuse technological or
medical equipment. The U.S. Russia China and other countries established
a separate military commands for cyber warfare and for defense of cyber
terrorism. We will work hard to show the big picture of cyber terrorism. We
know that the world is in the turn of Science and technology and expertise
reshape every field of our life, now also technology changes the
International Relation and other sciences. The E- Government changes the
way governments work, at the other hand the Social media changes the
International Relations and political leaders communicate and react on the
issues of the world. The behaviour of the war is now totally changed from
conventional war to Cyber war. Cold war and now a day it is switched to
another state, which is called cold cyber war. In the manifestation of digital
technological change, the concept of State changes into a virtual states or
cyber states. The world aspects the subject of terrorism just after 9/11, the
International Relations of the domain and almost all stats altered the foreign policies due to savage, terrorism issues and this terrorism now
changed to cyber terrorism and it altered the frame work of the
International Relation to challenge the cyber terrorism. We cover all the
above discussion in this thesis

References

A Conversation With Admiral J Michael Mcconnell. (n.d.). Retrieved

october 26, 2018 from

https://wn.com/a_conversation__with_admiral_j_michael_mcconn

ell

Aboul Enein, S. (2016). Report of the group of governmental experts on

developments in the field of information and telecommunications in

the context of international security.

Awan, I. (2014). Debating the Term Cyber-Terrorism: Issues and Problems.

Internet Journal of Criminology, 6743, 1–14.

Bakshi, A., & Yogesh, B. (2010). Securing cloud from ddos attacks using

intrusion detection system in virtual machine. In Communication

Software and Networks, 2010. ICCSN’10. Second International

Conference on (pp. 260–264).

Brezina, T. (1996). Adapting to strain: An examination of delinquent coping

responses. Criminology, 34(1), 39–60.

Conway, M. (2006). Terrorism and the Internet: New media—New threat?

Parliamentary Affairs, 59(2), 283–298.

Correia, M., & Andr, F. (2009). D EP S KY : Dependable and Secure

Storage in a Cloud-of-Clouds, 31–45.

Eriksson, J., & Giacomello, G. (2007). International relations and security

in the digital age. International Politics. Routledge.

http://doi.org/10.4324/9780203964736

Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber

War. Survival, 53(1), 23–40.

http://doi.org/10.1080/00396338.2011.555586

Hughes, R. (2009). Towards a global regime for cyber warfare. Cryptology

and Information Security Series, 3, 106–117.

http://doi.org/10.3233/978-1-60750-060-5-106

Impact of Alleged Russian Cyber Attacks. (n.d.). Retrieved from

http://www.dtic.mil/dtic/tr/fulltext/u2/a504991.pdf

Roberts, L. (2008). Jurisdictional and definitional concerns with computermediated Interpersonal crimes: An Analysis on Cyber Stalking.

International Journal of Cyber Criminology, 2(1).

Romano, C. P. R. (2000). The peaceful settlement of international

environmental disputes: A pragmatic approach. Kluwer Law

International, The Hague(Netherlands). 410, 2000.

Slack, C., & Slack, C. (2016). Wired yet Disconnected : The Governance of

International Cyber Relations, 7(1), 69–78.

http://doi.org/10.1111/1758-5899.12268

Toregas, C., & Zahn, N. (2014). Insurance for Cyber Attacks: The Issue of

Setting Premiums in Context, 20. Retrieved from

https://www.seas.gwu.edu/~cspri/s/cyberinsurance_paper_pdf.pdf

United States of America, Plaintiff-appellee, v. Rajib K. Mitra, Defendantappellant, 405 F.3d 492 (7th Cir. 2005) :: Justia. (n.d.). Retrieved

October 26, 2018, from

https://law.justia.com/cases/federal/appellatecourts/F3/405/492/473548/

University Information Technology Services. (2010). Data Center Access

Policies and Procedures, 1–9.

Warikoo, A. (2014). Proposed Methodology for Cyber Criminal Profiling.

Information Security Journal: A Global Perspective, 23(4–6), 172–

http://doi.org/10.1080/19393555.2014.931491

Weimann, G. (2004). www. terror. net: How modern terrorism uses the

Internet (Vol. 116). DIANE Publishing.

Yar, M. (2013). Cybercrime and society. Sage.

Yunos, Z., Ahmad, R., & Mohd Sabri, N. A. (2015a). A Qualitative

Analysis for Evaluating a Cyber Terrorism Framework in Malaysia.

Information Security Journal: A Global Perspective, 3555(May), 1–

http://doi.org/10.1080/19393555.2014.998844

Yunos, Z., Ahmad, R., & Mohd Sabri, N. A. (2015b). A Qualitative

Analysis for Evaluating a Cyber Terrorism Framework in Malaysia.

Information Security Journal: A Global Perspective, 3555(May), 1–

http://doi.org/10.1080/19393555.2014.998844

Zhou, M., Zhang, R., Zeng, D., & Qian, W. (2010). Services in the Cloud

Computing Era : A Survey

Downloads

Published

2020-01-11