Cyberterrorism in the cloud: through a glass darkly

Barry Cartwright, George R. S. Weir, Richard Frank

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This chapter addresses the relationship between cyberterrorism and Cloud computing, seeking to establish a better appreciation of the nature and likelihood of such terrorism. The defining characteristics of terrorism and cyberterrorism are explored, and a contrast is drawn between cyberterrorism and terrorist use of cyberspace. We ask whether any meaningful incidents of cyberterrorism have occurred to date, and offer a definition of cyberterrorism against which future putative incidents may be gauged. The use of cyberspace by terrorists is considered, along with other factors that might render Cloud-based services more vulnerable to terrorist activities. In this context, we explore the nexus between cyberlaw and cyberterrorism, with focus upon jurisdictional issues and issues that arise when dealing with politically-charged, transnational events. To conclude, we contemplate the prospects for future directions in cyberterrorism, and the prospects that the Cloud might facilitate or become a target of such attacks.
Original languageEnglish
Title of host publicationSecurity, Privacy, and Digital Forensics in the Cloud
EditorsLei Chen, Hassan Takabi, Nhien-An Le-Khac
Place of PublicationHoboken, N.J.
PublisherJohn Wiley & Sons Inc.
Chapter11
Pages217-237
Number of pages21
ISBN (Electronic)9781119053378
ISBN (Print)9781119053286
Publication statusPublished - 29 Apr 2019

Keywords

  • cyber attack
  • cyberterrorism
  • cloud computing

Fingerprint Dive into the research topics of 'Cyberterrorism in the cloud: through a glass darkly'. Together they form a unique fingerprint.

Cite this