This handbook addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
Threats from Cyber Warfare Activities to the Civil Society.
1: Cyber Warfare, Asymmetry, and Responsibility: Considerations for Defence Theorem.
2: National Security Policy and Strategy and Cyber Security Risks.
3: Cyber Criminal Profiling.
4: Hacking and Hacktivism as an Information Communication System Threat.
5: Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today.
6: Analysis of Success of Mobilization to Terror Using Tools of Neuro-Linguistic Programming (NLP).
7: Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects.
8: Access to Information in the Republic of Macedonia: Between Transparency and Secrecy.
Toward Resilient Society against Cyber War.
9: Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare: National Cyber Defense and Cyber Attack Capabilities.
10: Information Security as a Part of Curricula in Every Professional Domain, Not Just ICT's.
11: Al-Based Cyber Defense for More Secure Cyberspace.
12: Mitigating Unconventional Cyber-Warfare: Scenario of Cyber 9/11.
13: Changing the Approach to Deterrence in Cyberspace while Protecting Civilians from Cyber Conflict.
14: Cyber Threats to Critical Infrastructure Protection: Public Private Aspects of Resilience.
15: Toward More Resilient Cyber Infrastructure: A Practical Approach.
16: Novel First Responder Digital Forensics Tool as a Support to Law Enforcement.
17: Human Factor Role for Cyber Threats Resilience.
18: The Impact of Human Behavior on Cyber Security.
19: International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict.
20: Right to Life and Cyber Warfare: Applicability of Legal Regimes during Counterterrorist