Presentation of a Conceptual Model for Assessing the Threats of Cyber Terrorism

Document Type : Original Article

Authors

1 Doctoral Degree in Strategic Management of Cyberspace Security- (Corresponding Author)

2 Faculty member of Shahed University

Abstract

Abstract
Cyber terrorism is one of the threats to the cyber space that has faced many countries in recent years, including the Islamic Republic of Iran. In this article, after studying the backgrounds related to terrorism and cyber terrorism, its position among other cyber threats, features of cyber terrorism, ontology, actors, its components, cyber terrorism strategies, types of attacks of cyber terrorism are described and the researcher's definition of cyber terrorism is stated. In the field of cyber terrorism, the methods of assessing the threat of cyber terrorism are discussed and a conceptual model is presented while extracting the relevant components and factors from the research literature, then, by using snowball method, experts of strategic areas of cyberspace, 31 people were gathered and with their Opinions through interview and questionnaire, also using SPSS, SMART PLS software, the proposed conceptual model was tested and final model were Drawn

Keywords


  • منابع:

    • آشوری، داریوش، (1382)، دانش­نامه سیاسی، تهران: انتشارات مروارید.
    • بیات، غلامرضا، (1392)، نقش بسیج در پدافند سایبری و تأثیر آن بر امنیت ملی جمهوری اسلامی ایران، تهران: فصلنامه راهبردی بسیج، شماره 58.
    • جعفری، مجتبی، (1392)، تهدیدات امنیتی سایبرتروریسم، مشهد: ششمین کنگره انجمن ژئوپلیتیک ایران (پدافند غیرعامل).
    • جلالی، غلامرضا، (1389)، روش و مدل برآورد تهدیدات و پدافند غیرعامل، تهران: انتشارات دانشگاه امام حسین (ع).
    • خلیلی، سیاوش، (1391)، روش‌های پژوهش آمیخته، چاپ دوم، تهران: مؤسسه انتشارات یادواره کتاب.
    • سمیعی­اصفهانی، علیرضا؛ سالکی، عبدالکریم، (1394)، ترور، تروریسم و تروریسم دولتی، مجله سیاسی، اقتصادی، شماره 299.
    • شورای عالی افتا، (1384)، مجموعه مستندات سند راهبردی امنیت فضای تبادل اطلاعات کشور، تهران.
    • دهخدا، علی‌اکبر، (١٣٧٧)، فرهنگ لغات دهخدا، تهران: امیرکبیر.
    • سازمان پدافند غیرعامل کشور، (1391)، انواع تهدیدات و نحوه بررسی و ارزیابی آن‌ها، تهران: سازمان پدافند غیرعامل کشور.
    • عمید، حسن، (1332)، فرهنگ فارسی عمید، تهران، چاپ میلاد نور، چاپ اول قطع جیبی سال 1389.
    • قرارگاه پدافند سایبری کشور، (1394)، سند راهبردی پدافند سایبری کشور، تهران: قرارگاه پدافند سایبری.
    • معین، محمد، (1363)، فرهنگ معین، چاپ ششم، تهران: امیرکبیر.
    • ویکی پدیای فارسی؛ http://fa.wikipedia.org
      • Akhgar, Babak. Staniforth Andrew. Bosco, M.Francesca. (2014), Cyber Crime and Cyber Terrorism Investigator's Handbook, Elsevier, http://www.sciencedirect.com.
      • Akhgar, B. Choraś, M. Brewster, B. Bosco, F. Vermeersch, E. Luda, V. … Wells, D. (2016), Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. Combatting Cybercrime and Cyberterrorism Springer, Cham.
      • Albahar, M. (2017), Cyber Attacks and Terrorism: A Twenty-First Century Conundrum. Science And Engineering Ethics. https://doi.org/10.1007/s11948-016-9864-0
      • Al Mazari, A. Anjarin, A. H. Habib, S. A. Nyakwende, E. (2016), Cyber Terrorism Taxonomies: Definition,Targets, Patterns, Risk Factors, and Mitigation Strategies. International Journal of Cyber Warfare and Terrorism (IJCWT), 6(1), 1–12.
      • Bester, P.C. (2019), Emerging challenges in terrorism and counterterrorism: A national security perspective. Paper presented on 17 January 2019 at the, The Hague University of Applied Sciences, Faculty of Public Managament, Law and Safety, The Hague.
      • Chuipka, A. (2017), The Strategies of Cyberterrorism: Is Cyberterrorism an effective means to Achieving the Goals of Terrorists. http://137.122.14.44/handle/10393/35695
      • Denning, D.E. (2001), Is Cyber Terror Next? Social Science Research Council, W, DC, USA.
      • Forest, Brian. (2009), Terrorism, Crime, and Public Policy, UK, Cambridge University Press.
      • Haimes,Y.Yacov. (2009), Risk Modeling, Assessment, and Management, Third Edition, John Wiley and Sons, Inc.
      • Leson, (2005), Assessing and / Managing the Terrorism Threat, U.S. Department of JusticeOffice of Justice Programs,Washington, DC 20531.
      • Lourdeau, K. (2004), Testimony of Keith Lourdeau, Deputy Assistant Director, Cyber Division, FBI before the Senate Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, February 24, 2004, Senate, Washington, DC, USA. http://www.fbi.gov/news/ testimony/hearing-on-cyber-terrorism.
      • Luiijf, Eric. (2015), Definitions of Cyber Terrorism. http://www.sciencedirect.com.
      • Salleh, N. M. Selamat, S. R. Yusof, R. Sahib, S. (2016), Discovering Cyber Terrorism Using Trace Pattern. International Journal of Network Security.
      • Munk, Tine Højsgaard. (2015). cyber security in european region: Anticipatory Governance and Practices, University of Manchester, USA.
      • NCTB. (2014), What is Terrorism? National Coordinator for Counterterrorism, Den Haag, the Netherlands.http://english.nctb.nl/themes_en/Counterterrorism /what_is_terrorism, (23.02.14).
      • NIST. (2008), Framework for Improving Critical Infrastructure Cybersecurity, http://csrc.nist.gov
      • NIST. (2014), Framework for Improving Critical Infrastructure Cybersecurity version 1.0. http://csrc.nist.gov
      • OWASP Risk Rating Methodology-OWASP https://www.owasp.org/index.php /OWASP_Risk_Rating_Methodology#Approach.
      • P. Fidler, David, Buchan, Russell, Crawford, Emily, Adhihetty, TJ, Harrison Dinniss, Heather, Ducheine, Paul, Eichensehr, Kristen, Housen-Couriel, Deborah, Ivanov, Eduard,Kim, Sung-Won, Nasu, Hitoshi, K. Nkusi, Fred, Ellen O’Connell, Mary, Sobrinho de Morais Neto Arnaldo, Tsagourias, Nicholas, Ziolkowski, Katharina. (2016), Study Group on Cybersecurity, Terrorism, and International Law, INTERNATIONAL LAW ASSOCIATION, http://www.ila-hq.org/en/studygroups/
      • index.cfm/cid/1050.
      • SEissa, Israa. Ibrahim, Jamaludin. Yahaya, Nor-Zaiasron. (2017), Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review, International Journal of Science and Research, ISSN (Online): 2319-7064.
      • Veerasamy, namosha, Grobler, M. Sloms, B. V. (2016), Building an Ontology for Cyberterrorism.https://www.researchgate.net
    • عبدالله خانی، علی، (1386)، تهدیدات امنیت ملی، تهران: انتشارات بین‌المللی ابرار معاصر تهران.
    • ناجی­راد، محمدعلی، (1387)، جهانی‌شدن تروریسم، چاپ اول، تهران: انتشارات وزارت امور خارجه.