Defining Cyber Terrorism: A New Taxonomy
Defining Cyber Terrorism: A New Taxonomy
Large-scale cyber attacks are increasing at an alarming rate around the world. These attacks
are often being linked to the widely publicized and popularized threat of cyber terrorism.
However, cyber terrorism is a relatively young field of research and the terminology, much
like its parent term, ‘terrorism’, is still not adequately defined or congruently applied. This
paper provides a comparative analysis of the definition of ‘cyber terrorism’ and proposes a
new universally-applicable definition and taxonomy. The new definition is derived from
detailed analyses of existing definitions in the publicly available literature, which includes all
of the key commonalities identified in accordance with the newly proposed taxonomy (i.e.
actor, motive, intent, means, effect, and target). This new approach to defining cyber
terrorism provides a common understanding of the broader threat for policy standardization,
global collaboration, and research, whilst allowing for unique subsets of cyber terrorism to be
defined for specific legal or specialty applications.
Cyber Terrorism is a relatively young field and hence there is a notable shortage of reputable
literature to inform policy, guide public discussion, and drive decision-making. One
fundamental issue that remains unsolved and is delaying all other developments in this area is
the question of definition - what is cyber terrorism? A number of definitions have been
proposed since the mid-eighties, however none of these definitions have proved sufficient for
universal agreement and adoption. The goal of this paper is to analyze the major definitional
contributions over time in order to propose a unified definition, grounded in existing
literature and current usage.
1.1 INTRODUCTION
Cyberterrorism is a premeditated, politically motivated attack on computer systems,
programs, and data that threatens or results in violence. The goal is to cause fear or alarm,
and disrupt critical infrastructure that's vital to social, economic, political, and business
[Link] can use the same techniques as traditional cyberattacks, such as:
DDoS attacks, Malware, Social engineering strategies, and Phishing campaigns.
Some examples of cyber terrorism include:
>Introducing viruses to vulnerable data networks.
>Hacking servers to disrupt communication and steal sensitive information.
>Defacing websites and making them inaccessible to the public.
>Hacking communication platforms to intercept or stop communications.
Cyber terrorism refers to the use of computer networks and digital technologies to conduct or
facilitate attacks aimed at causing harm, fear, or disruption to achieve political, ideological,
or religious goals. Unlike traditional forms of terrorism, cyber terrorism operates in the
digital realm, where attackers can target critical infrastructures, government networks,
financial institutions, and public services. The consequences can be far-reaching, from
financial losses and privacy breaches to widespread public safety concerns and potential
national security threats.
Cyber terrorists use various tactics, including distributed denial-of-service (DDoS) attacks,
malware, ransomware, and phishing schemes, to exploit vulnerabilities in digital systems.
With the rapid digital transformation, the attack surface has expanded, making it easier for
cyber terrorists to access sensitive data, disrupt services, or even manipulate public
perception through social engineering and misinformation.
Addressing cyber terrorism requires a multi-faceted approach involving technological
defenses, regulatory measures, and international cooperation. Stronger cybersecurity
frameworks, real-time threat intelligence, and active public-private sector collaboration are
essential to prevent, detect, and respond to cyber terrorism effectively. As technology
advances, so does the sophistication of cyber terrorism tactics, making ongoing research and
innovation in cybersecurity a critical priority.
Fig.1:example for cyberterorrism
1.2 OVERVIEW
There is debate over the basic definition of the scope of cyberterrorism. These definitions can
be narrow such as the use of Internet to attack other systems in the Internet that result to
violence against persons or [Link] can also be broad, those that include any form of
Internet usage by terrorists to conventional attacks on information technology infrastructures.
There is variation in qualification by motivation, targets, methods, and centrality of computer
use in the act. U.S. government agencies also use varying definitions and that none of these
have so far attempted to introduce a standard that is binding outside of their sphere of
influence.
Depending on context, cyberterrorism may overlap considerably with cybercrime, cyberwar
or ordinary [Link] Kaspersky, founder of Kaspersky Lab, now feels that
"cyberterrorism" is a more accurate term than "cyberwar". He states that "with today's
attacks, you are clueless about who did it or when they will strike again. It's not cyber-war,
but cyberterrorism." He also equates large-scale cyber weapons, such as the Flame Virus and
NetTraveler Virus which his company discovered, to biological weapons, claiming that in an
interconnected world, they have the potential to be equally [Link] cyberterrorism is
treated similarly to traditional terrorism, then it only includes attacks that threaten property or
lives, and can be defined as the leveraging of a target's computers and information,
particularly via the Internet, to cause physical, real-world harm or severe disruption of
infrastructure.
Many academics and researchers who specialize in terrorism studies suggest that
cyberterrorism does not exist and is really a matter of hacking or information [Link]
disagree with labeling it as terrorism because of the unlikelihood of the creation of fear,
significant physical harm, or death in a population using electronic means, considering
current attack and protective technologies.
If death or physical damage that could cause human harm is considered a necessary part of
the cyberterrorism definition, then there have been few identifiable incidents of
cyberterrorism, although there has been much policy research and public concern. Modern
terrorism and political violence is not easily defined, however, and some scholars assert that
it is now "unbounded" and not exclusively concerned with physical damage.
1.3 TYPES OF CYBERTERORRISM/ATTACKS
DENIAL OF SERVICE(DOS)
MALWARE ATTACK
PHISHING AND SOCIAL ENGINEERING
RANSOMWARE
[Link] OF SERVICE(DOS):
Denial of service :In computing, a denial-of-service attack (DoS attack) is a cyber-attack in
which the perpetrator seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host connected to a
network. Denial of service is typically accomplished by flooding the targeted machine or
resource with superfluous requests in an attempt to overload systems and prevent some or all
legitimate requests from being [Link] range of attacks varies widely, spanning from
inundating a server with millions of requests to slow its performance, overwhelming a server
with a substantial amount of invalid data, to submitting requests with an illegitimate IP
[Link] a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding
the victim originates from many different sources. More sophisticated strategies are required
to mitigate this type of attack; simply attempting to block a single source is insufficient as
there are multiple sources.A DoS or DDoS attack is analogous to a group of people crowding
the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting
trade and losing the business money. Criminal perpetrators of DoS attacks often target sites
or services hosted on high-profile web servers such as banks or credit card payment
gateways. Revenge and blackmail, as well as hacktivism,can motivate these attacks.
How Do DoS Attacks Work?
DoS attacks typically exploit vulnerabilities in a target’s network or computer systems.
Attackers can use a variety of methods to generate overwhelming traffic or requests,
including:
1. Flooding the target with a massive amount of data
2. Sending repeated requests to a specific part of the system
3. Exploiting software vulnerabilities to crash the system
Prevention Given that Denial of Service (DoS) attacks are becoming more frequent, it is a
good time to review the basics and how we can fight back.
Cloud Mitigation Provider – Cloud mitigation providers are experts at providing
DDoS mitigation from the cloud. This means they have built out massive amounts of
network bandwidth and DDoS mitigation capacity at multiple sites around the Internet
that can take in any type of network traffic, whether you use multiple ISP’s, your own
data center, or any number of cloud providers. They can scrub the traffic for you and
only send “clean” traffic to your data center.
Firewall – This is the simplest and least effective method. Python scripts are often
written to filter out malicious traffic, or existing firewalls can be utilized by
enterprises to block such traffic.
Internet Service Provider (ISP) – Some enterprises use their ISP to provide DDoS
mitigation. These ISPs have more bandwidth than an enterprise would, which can
help with large volumetric attacks.
How to Protect Yourself from DDoS Attacks?
1. Take quick action: Sooner the DDoS attack is identified, the quicker the harm can be
resisted. Companies should provide DDoS services or a certain kind of technology so
that the heavy traffic can be realized and worked upon as soon as possible.
2. Configure firewalls and routers: Firewalls and routers should be configured in such
a way that they reject bogus traffic and you should keep your routers as well as
firewalls updated with the latest security patches.
3. Consider artificial intelligence: While present defenses of advanced firewalls and
intrusion detection systems are very common, Artificial intelligence is being used to
develop new systems.
4. Secure your Internet of Things devices: To keep your devices from becoming a part
of a botnet it’s smart to make sure your computers have trusted security software. It’s
important to keep it updated with the latest security patches.
Virus: When a computer virus is executed, it can replicate itself by modifying other
programs and inserting its malicious code. It is the only type of malware that can “infect”
other files and is one of the most difficult types of malware to remove.
Worm: A worm has the power to self-replicate without end-user involvement and can infect
entire networks quickly by moving from one machine to another.
Trojan: Trojan malware disguises itself as a legitimate program, making it one of the most
difficult types of malware to detect. This type of malware contains malicious code and
instructions that, once executed by the victim, can operate under the radar. It is often used to
let other types of malware into the system.
Hybrid malware: Modern malware is often a “hybrid” or combination of malicious software
types. For example, “bots” first appear as Trojans then, once executed, act as worms. They
are frequently used to target individual users as part of a larger network-wide cyber attack.
Adware: Adware serves unwanted and aggressive advertising (e.g., pop-up ads) to the end-
user.
Malvertising: Malvertising uses legitimate ads to deliver malware to end-user machines.
Spyware: Spyware spies on the unsuspecting end-user, collecting credentials and passwords,
browsing history and more.
Ransomware: Ransomware infects machines, encrypts files and holds the needed decryption
key for ransom until the victim pays. Ransomware attacks targeting enterprises and
government entities are on the rise, costing organizations millions as some pay off the
attackers to restore vital systems. Cyptolocker, Petya and Loky are some of the most common
and notorious families of ransomware.
Examples of Malware Attacks
Here are just a few of the many types of malware cyber attackers use to target sensitive data:
Pony malware is the most commonly used malware for stealing passwords and credentials. It
is sometimes referred to as Pony Stealer, Pony Loader or FareIT. Pony malware targets
Windows machines and collects information about the system and the users connected to it. It
can be used to download other malware or to steal credentials and send them to the command
and control server.
Loki, or Loki-Bot, is an information-stealing malware that targets credentials and passwords
across approximately 80 programs, including all known browsers, email clients, remote
control programs and file sharing programs. It has been used by cyber attackers since 2016
and continues to be a popular method for stealing credentials and accessing personal data.
Krypton Stealer first appeared in early 2019 and is sold on foreign forums as malware-as-a-
service (MaaS) for just $100 in cryptocurrency. It targets Windows machines running version
7 and above and steals credentials without the need for admin permissions. The malware also
targets credit card numbers and other sensitive data stored in browsers, such as browsing
history, auto-completion, download lists, cookies and search history.
Triton malware crippled operations at a critical infrastructure facility in the Middle East in
2017 in one of the first recorded malware attacks of its kind. The malware is named after the
system it targets – Triconex safety instrumented system (SIS) controllers. These systems are
used to shut down operations in nuclear facilities, oil and gas plants in the event of a problem,
such as equipment failure, explosions or fire. The Triton malware is designed to disable these
failsafe mechanisms, which could lead to physical attacks on critical infrastructure and
potential human harm.
Social engineering attacks can be performed in various ways. They may involve computers,
use the phone, or happen in person. For example, pretending to be a mail carrier or asking
someone to hold the door are classic examples of social engineering attacks designed to gain
physical access to a secure area.
However, not all phishing attacks require this malicious link or file. Some are designed to
trick the user into taking some action with no malicious content involved. For example,
business email compromise (BEC) attacks often involve fake invoices for services that were
allegedly performed for the company. These invoices don’t contain malware, but, if the
recipient believes and pays the invoice, then the money goes to the attacker.
Phishing is commonly associated with emails, but any messaging platform can be used to
perform these attacks. Phishing over text messages is named smishing (for SMS phishing),
and social media, corporate collaboration platforms, and similar solutions can also be used to
perform phishing attacks.
Employee Training: Social engineering attacks commonly rely on deception and trickery.
Training employees to recognize these attacks and respond correctly reduces the risk of a
successful attack.
Email Security: Phishing is one of the most common forms of social engineering attacks.
Email security solutions can identify and block malicious emails before they reach an
employee’s inbox.
Account Security: Social engineering attacks like phishing are often designed to steal login
credentials for users’ accounts. The use of multi-factor authentication (MFA), zero-trust
network access (ZTNA), and similar solutions can reduce the risk that an attacker can access
these accounts and the potential damage that they can do if they succeed.
Endpoint Security: Social engineering attacks are also often used to deploy malware on
corporate systems. Endpoint security systems can prevent these malware infections,
eliminating the threat to the business.
Web Security: Malicious links in phishing messages can direct users to malicious websites
that steal data or deliver malware. In-browser security can identify and block malicious
content from reaching a user’s device.
Data Loss Prevention (DLP): Social engineering attacks are often designed to steal sensitive
data. DLP solutions can identify flows of sensitive data to unauthorized parties and block the
data leakage.
Prevention methods of phishing
As a general rule of thumb, unless you 100% trust the site you are on, you should not
willingly give out your card information. Make sure, if you have to provide your information,
that you verify the website is genuine, that the company is real and that the site itself is
secure. In addition to such measures, below are ten of the most notable ways to protect your
systems and data from phishing attacks:
1. Know what a phishing scam looks like
2. Get free anti-phishing add-ons
3. Conduct security awareness training
4. Use strong passwords & enable two-factor authentication
5. Don’t ignore update messages
6. Exercise caution when opening emails or clicking on links
7. Don’t give your information to an unsecured site
8. Don’t be tempted by those pop-ups
9. Rotate passwords regularly
10. Implement anti-phishing tools
[Link]
Ransomware has quickly become the most prominent and visible type of malware. Recent
ransomware attacks have impacted hospitals’ ability to provide crucial services, crippled
public services in cities, and caused significant damage to various organizations.
Ransomware Attack – What is it and How Does it Work?
Why Are Ransomware Attacks Emerging?
The modern ransomware craze began with the WannaCry outbreak of 2017. This large-scale
and highly-publicized attack demonstrated that ransomware attacks were possible and
potentially profitable. Since then, dozens of ransomware variants have been developed and
used in a variety of attacks.
In the year 2023 alone, attempted ransomware attacks have targeted 10% of organizations
globally. This marks a notable rise from the 7% of organizations facing similar threats in the
previous year, representing the highest rate recorded in recent years.
One of these is phishing emails. A malicious email may contain a link to a website hosting a
malicious download or an attachment that has downloader functionality built in. If the email
recipient falls for the phish, then the ransomware is downloaded and executed on their
computer.
Another popular ransomware infection vector takes advantage of services such as the Remote
Desktop Protocol (RDP). With RDP, an attacker who has stolen or guessed an employee’s
login credentials can use them to authenticate to and remotely access a computer within the
enterprise network. With this access, the attacker can directly download the malware and
execute it on the machine under their control.
Others may attempt to infect systems directly, like how WannaCry exploited the EternalBlue
vulnerability. Most ransomware variants have multiple infection vectors.
While these three core steps exist in all ransomware variants, different ransomware can
include different implementations or additional steps. For example, ransomware variants like
Maze perform files scanning, registry information, and data theft before data encryption, and
the WannaCry ransomware scans for other vulnerable devices to infect and encrypt.
1.4 MOTIVATION
4. Recruitment and Propaganda: Cyber tools are also used for recruiting new
members, organizing events, or spreading propaganda. Social media, encrypted
messaging apps, and websites serve as platforms for terrorist organizations to
spread their message.
Preventing cyberterrorism requires a multifaceted approach, as the nature of these attacks can
vary widely, from disrupting critical infrastructure to stealing sensitive information or
spreading propaganda. Here are some key prevention methods to reduce the risk of
cyberterrorism:
1. Enhanced Cybersecurity Measures
Robust Encryption: Use strong encryption for data in transit and at rest to prevent
unauthorized access.
Multi-Factor Authentication (MFA): Enforce MFA across all sensitive accounts and
systems to add an extra layer of protection against unauthorized access.
Regular Patch Management: Ensure that all systems are up-to-date with the latest
security patches to close vulnerabilities that could be exploited by cyber terrorists.
Advanced Threat Detection: Use AI-driven intrusion detection and prevention
systems (IDS/IPS) to monitor and analyze traffic for potential threats in real time.
Firewalls and Segmentation: Implement firewalls and network segmentation to limit
the scope of damage in case of an attack.
2. Cybersecurity Awareness and Training
Employee Education: Regular training for employees on cybersecurity best practices,
including how to recognize phishing attempts and other social engineering tactics.
Simulated Attacks: Conduct simulated phishing and penetration testing exercises to
help organizations and individuals practice identifying and responding to cyber
threats.
Public Awareness Campaigns: Increase general awareness about the importance of
cybersecurity among the public and critical infrastructure operators.
3. Collaboration and Information Sharing
Public-Private Partnerships: Encourage collaboration between government agencies,
private corporations, and critical infrastructure providers to share threat intelligence
and best practices.
Threat Intelligence Sharing Platforms: Participate in industry-specific and global
threat intelligence platforms to share information about emerging cyber threats and
attacks.
Cross-Border Cooperation: Since cyberterrorism can span multiple jurisdictions,
international cooperation is crucial for identifying, investigating, and prosecuting
cyberterrorists.
4. Critical Infrastructure Protection
Security Audits and Risk Assessments: Regularly conduct comprehensive security
audits of critical infrastructure, including power grids, water systems, and
transportation networks, to identify and address potential vulnerabilities.
Redundancy and Backup Systems: Implement backup systems for essential services to
ensure that if one system is compromised, there is a failover in place to continue
operations.
Physical Security: Combine cybersecurity measures with physical security for key
infrastructure (e.g., securing access to data centers, ensuring secure supply chains for
critical components).
5. Legal and Policy Frameworks
Strong Cyber Laws: Governments should enact and enforce laws specifically
targeting cyber terrorism, providing clear definitions, penalties, and mechanisms for
international cooperation.
International Agreements: Participate in international treaties, such as the Budapest
Convention on Cybercrime, to facilitate cross-border cooperation in investigating and
prosecuting cyberterrorism.
Data Protection Regulations: Ensure that data protection laws are in place to prevent
the exploitation of sensitive data by cyber terrorists.
6. Incident Response and Recovery Plans
Preparedness and Drills: Regularly test and update incident response plans to ensure
swift action in the event of a cyberterrorist attack. Include communication strategies
to inform the public and stakeholders.
Disaster Recovery Plans: Maintain comprehensive disaster recovery and business
continuity plans to minimize downtime and mitigate the impact of an attack.
Digital Forensics Capabilities: Develop expertise in digital forensics to trace the
source of attacks, understand the methods used, and gather evidence for prosecution.
7. Monitoring and Surveillance
Dark Web Monitoring: Monitor dark web forums and other underground spaces for
signs of cyberterrorist activities, including the sale of exploit tools, plans for attacks,
or discussions about targeting critical infrastructure.
Social Media Monitoring: Track social media platforms and online communication
channels for potential threats or calls to action by terrorist groups.
8. Artificial Intelligence and Machine Learning
AI-Driven Threat Detection: Leverage machine learning algorithms to detect
anomalies in network traffic, system behavior, or user activity that may indicate the
presence of a cyber terrorist.
Predictive Analytics: Use predictive analytics to anticipate cyber threats based on
historical data and threat intelligence.
1.9 CONCLUSION
In conclusion, cyberterrorism represents an evolving and increasingly sophisticated
threat to both national and global security. Its potential to disrupt critical infrastructure,
destabilize economies, and cause widespread social unrest makes it a pressing concern
for governments, businesses, and individuals alike. The attacks we have seen thus far are
only the beginning, and as technology continues to evolve, so too will the methods of
[Link] address this challenge, we must take a multi-faceted approach that
involves continuous collaboration, investment in cutting-edge technologies, robust
defense mechanisms, and proactive measures to combat cybercrime. Preparedness,
awareness, and cooperation will be our best tools in fighting this ever-growing threat.
By strengthening global cybersecurity efforts, enhancing our resilience to cyberattacks,
and fostering international partnerships, we can work toward mitigating the risks posed
by cyberterrorism and securing a safer digital future for all.
Ultimately, the fight against cyberterrorism is not one that can be won by any single
entity. It requires a unified, concerted global effort to share knowledge, resources, and
technologies, to ensure that cybersecurity remains an integral part of national and
international security strategies. The more we understand about the evolving nature of
cyberterrorism, the better equipped we will be to defend against it and protect our
societies from its damaging effects.
As our digital landscape continues to expand, cyberterrorism has become an increasingly
prominent threat to global security, economic stability, and public safety. The fusion of
cyber capabilities with politically or ideologically motivated violence has created a new
form of warfare that is difficult to predict and combat. While cyberterrorism differs from
traditional terrorism in its methods, the consequences can be equally, if not more,
devastating. From disrupting critical infrastructure to causing widespread fear and panic,
cyberterrorism poses a significant risk to nations, organizations, and individuals alike.
1.10 REFERENCE
References for Further Reading:
1. Cybersecurity Ventures: Global Cybercrime Economy report (2023)
2. CISA (Cybersecurity and Infrastructure Security Agency): Cybersecurity Threats and
Trends (2023)
3. European Union Agency for Cybersecurity (ENISA): Cybersecurity Threat Landscape
(2023)
4. FBI: Dark Web Threats and Cyberterrorism (2023)
This data, combined with the narrative you construct in your technical seminar report, will
provide a thorough analysis of cyberterrorism, its impacts, and the strategies for mitigation.
Always ensure you reference credible and up-to-date sources when presenting this
information.