Demystifying Cyber terrorism: Causes, Costs & its impact on individuals’ psyche and public confidence

Syed Rameem Zahra, Tausifa Jan Saleem, Sonia
{"title":"Demystifying Cyber terrorism: Causes, Costs & its impact on individuals’ psyche and public confidence","authors":"Syed Rameem Zahra, Tausifa Jan Saleem, Sonia","doi":"10.1109/REEDCON57544.2023.10150766","DOIUrl":null,"url":null,"abstract":"Just like the game for Information Technology (IT) security was turned topsy-turvy by the arrival of mobile devices a few decades ago, the Internet of Things (IoT) today is changing it again a big time. Data breaches, loss of productivity and profitability were quite a commonplace when mobile security became an issue. Today as IoT tries to connect everything to the internet, it intensifies the problem (more privacy violations, phishing/skimming attacks, security incidents) by creating a vast attack surface for the rogue players implying that important national (ports, airports, bridges, power-pants etc.) and cyber infrastructure could now be attacked. Moreover, if the network of your company has a weak point, it can easily be compromised to set off an attack. These Cyber terrorism attacks instigate identical responses from individuals as those for conventional terrorism attacks e.g. they heighten anxiety and stress, worsen feelings of vulnerability and harden the political attitudes of people. But this dimension is often overlooked by the policy makers. However, the increase in cyber terrorism cases has increased the research interest in the domain. Researchers are focusing on improving the security of internet and IoT devices. The field is still in its infancy. A lot needs to be done to mitigate these attacks. Motivated to demystify the repercussions of the cyber terrorism, this paper analyzes the distinctive characteristics of the most significant cyberattacks, investigates the expenditures incurred by the industries as a result of these cyber events, and then examines the impact of these attacks on the psychological health of the populace and the trust in public institutions.","PeriodicalId":429116,"journal":{"name":"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/REEDCON57544.2023.10150766","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Just like the game for Information Technology (IT) security was turned topsy-turvy by the arrival of mobile devices a few decades ago, the Internet of Things (IoT) today is changing it again a big time. Data breaches, loss of productivity and profitability were quite a commonplace when mobile security became an issue. Today as IoT tries to connect everything to the internet, it intensifies the problem (more privacy violations, phishing/skimming attacks, security incidents) by creating a vast attack surface for the rogue players implying that important national (ports, airports, bridges, power-pants etc.) and cyber infrastructure could now be attacked. Moreover, if the network of your company has a weak point, it can easily be compromised to set off an attack. These Cyber terrorism attacks instigate identical responses from individuals as those for conventional terrorism attacks e.g. they heighten anxiety and stress, worsen feelings of vulnerability and harden the political attitudes of people. But this dimension is often overlooked by the policy makers. However, the increase in cyber terrorism cases has increased the research interest in the domain. Researchers are focusing on improving the security of internet and IoT devices. The field is still in its infancy. A lot needs to be done to mitigate these attacks. Motivated to demystify the repercussions of the cyber terrorism, this paper analyzes the distinctive characteristics of the most significant cyberattacks, investigates the expenditures incurred by the industries as a result of these cyber events, and then examines the impact of these attacks on the psychological health of the populace and the trust in public institutions.
揭秘网络恐怖主义:原因、成本及其对个人心理和公众信心的影响
就像几十年前移动设备的出现颠覆了信息技术(IT)安全游戏一样,今天的物联网(IoT)正在再次彻底改变它。当移动安全成为一个问题时,数据泄露、生产力和盈利能力的损失是相当普遍的。今天,当物联网试图将一切连接到互联网时,它通过为流氓玩家创造巨大的攻击面来加剧问题(更多的隐私侵犯,网络钓鱼/浏览攻击,安全事件),这意味着重要的国家(港口,机场,桥梁,权力等)和网络基础设施现在可能受到攻击。此外,如果你公司的网络有弱点,它很容易被破坏,引发攻击。这些网络恐怖主义袭击引发了与传统恐怖主义袭击相同的个人反应,例如,它们加剧了焦虑和压力,加剧了脆弱感,并使人们的政治态度变得更加强硬。但这一点往往被政策制定者所忽视。然而,随着网络恐怖主义案件的增多,这一领域的研究兴趣日益浓厚。研究人员正致力于提高互联网和物联网设备的安全性。这一领域仍处于起步阶段。要减轻这些攻击,还有很多工作要做。为了揭开网络恐怖主义影响的神秘面纱,本文分析了最严重的网络攻击的鲜明特征,调查了这些网络事件导致的行业支出,然后研究了这些攻击对民众心理健康和公共机构信任的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信