Abstract

In the current era of the cyber space or cyber world, threats are the most difficult thing to handle in which we have to maintain and manage the cyber security system to not get vulnerable to any cyberattack and which can lead to a threat to the information system. Cyber security against digital or cybercrime and cyberterrorism has also been a more prominent issue in various organizations, institutions, governments, and in countries as well. It is also affecting various stakeholders, energy markets, schools, colleges, and the cyber infrastructure who are exploited to a cyberattack by the cyber terrorist or cybercriminals. There are several policies, rules and regulations, laws, and different techniques to tackle with cybercrime and cyberterrorism but the cyber terrorist does not have the fear against these things and they are still executing cybercrime against the military secrets of any country, against the organizations, against the individuals, etc. to misuse the information for the purpose of destroying the countries’ power in the world. There are several new tools and techniques available in the cyber space that allowed and encouraged the cyber terrorists to execute criminal acts against the world and compromise the information security system in various countries and in various government security policies. In this chapter, we are going to discuss about the different types of threats of a cyberattack, different types of cyberterrorism, and different technologies that are used by the cyber terrorist. This chapter will also provide the discussion about the rules and regulations, policies, laws, and emerging technologies that are introduced in the cyber world that can enhance and change the infrastructure of the cyber security, which can reduce and stop illegal activities in the cyber world and enhance the security infrastructure for the information system. This chapter gives an overview about the research work to follow, which provides the review of network security, cyber security, internal threats, and different topics in cyber security. This chapter also gives preventive and detective measures for the countermeasures against the cybercrime and cyberterrorism and provides security to the information system.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call