Cyber Terrorism: An Examination of the Critical Issues

ABSTRACT

This paper examines the critical issues relevant to Cyber terrorism. A review of the literature indicates that incidences of computer crime and cyber terrorism are increasing. The cyber attacks on the U.S.’s critical infrastructure are no longer random, but rather are coordinated and precise. The types of attacks are discussed and documented instances are examined. Lastly, policy recommendations are discussed that to further assist the U.S. in defending its critical infrastructures and essential operations.


AUTHORS

Department of Criminal Justice & Legal Studies, University of Central Florida

Mark Henych is currently a criminal investigator for the U.S. Customs Service. Prior to this he assisted with numerous international law enforcement assistance projects. Presently he is pursuing a Ph.D. in Public Affairs at the University of Central Florida. He has authored numerous articles dealing with computer crime, cyber terrorism, law enforcement canines, and select topics in corrections. His areas of interest and expertise include, cyber crime, computer crime and cyber terrorism.

Department of Criminal Justice & Legal Studies, University of Central Florida

Stephen T. Holmes is an Associate Professor of Criminal Justice at the University of Central Florida. Prior to this position, he was a social science analyst with the National Institute of Justice in Washington, DC. He has authored over 10 books and more than 18 articles dealing with policing, drug testing, probation and parole issues, and violent crime.

Department of Criminal Justice & Legal Studies, University of Central Florida

Charles Mesloh is a former law enforcement officer and K-9 handler and trainer with a Master’s degree in Public Administration from Florida Gulf Coast University. Currently, he is the Administrative Services Coordinator at the University of Central Florida Police Department pursuing a Ph.D. in Public Affairs. His areas of research include law enforcement training, canine utilization, forfeiture, and use of force.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com