This handbook addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers.
Front Cover.
Title Page.
Copyright Page.
Other Frontmatter.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
Foreword.
Preface.
Threats from Cyber Warfare Activities to the Civil Society.
1: Cyber Warfare, Asymmetry, and Responsibility: Considerations for Defence Theorem.
2: National Security Policy and Strategy and Cyber Security Risks.
3: Cyber Criminal Profiling.
4: Hacking and Hacktivism as an Information Communication System Threat.
5: Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today.
6: Analysis of Success of Mobilization to Terror Using Tools of Neuro-Linguistic Programming (NLP).
7: Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects.
8: Access to Information in the Republic of Macedonia: Between Transparency and Secrecy.
Toward Resilient Society against Cyber War.
9: Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare: National Cyber Defense and Cyber Attack Capabilities.
10: Information Security as a Part of Curricula in Every Professional Domain, Not Just ICT's.
11: Al-Based Cyber Defense for More Secure Cyberspace.
12: Mitigating Unconventional Cyber-Warfare: Scenario of Cyber 9/11.
13: Changing the Approach to Deterrence in Cyberspace while Protecting Civilians from Cyber Conflict.
14: Cyber Threats to Critical Infrastructure Protection: Public Private Aspects of Resilience.
15: Toward More Resilient Cyber Infrastructure: A Practical Approach.
16: Novel First Responder Digital Forensics Tool as a Support to Law Enforcement.
17: Human Factor Role for Cyber Threats Resilience.
18: The Impact of Human Behavior on Cyber Security.
19: International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict.
20: Right to Life and Cyber Warfare: Applicability of Legal Regimes during Counterterrorist