Cyber Terrorism: Political and Economic Implications

Ina Fourie (University of Pretoria)

Online Information Review

ISSN: 1468-4527

Article publication date: 17 April 2007

939

Keywords

Citation

Fourie, I. (2007), "Cyber Terrorism: Political and Economic Implications", Online Information Review, Vol. 31 No. 2, pp. 242-243. https://doi.org/10.1108/14684520710747266

Publisher

:

Emerald Group Publishing Limited

Copyright © 2007, Emerald Group Publishing Limited


In Cyber Terrorism: Political and Economic Implications, Andrew Colarik shares his expertise on a very real threat that affects all our lives and explores our vulnerabilities as individuals as well as nations. He defines cyber terrorism as:

[…] a premeditated, politically motivated criminal act by subnational groups or clandestine agents, against information and computer systems, computer programs, and data, that results in physical violence, where the intended purpose is to create fear in noncombatant targets.

In a world driven by a global information infrastructure and increased access to information, cyber terrorism is a reality of increased concern. It can affect each of us on all levels of life. Being aware of the scope, possible scenarios and methods of attack is but one step towards prevention and preparation.

In his brief but excellent overview Colarik makes us aware of the dangers of cyber terrorism and cyber attacks and how these are stimulated and supported by means of the global information infrastructure. In clear and simple terms he explains how the global information infrastructure is being used for the communication of information and the coordination of distributed terrorist cells. This includes the use of telephone lines, cable, satellite, the Internet and security systems, as well as the gathering of target intelligence. He also explores a variety of cyber criminal activities, including internal as well as external penetrations such as social engineering, firewalls and audit logs.

In dealing with the power of terrorism (e.g. intimidation, political strife and economic consequences) as well as the evolution of cyber terrorism (including hacking, cracking, activity dissemination and cyber terrorist attacks), Colarik brings home the message that we should understand the issues at hand and especially the role of technology and modes of electronic attacks, and that we should prepare accordingly. His message is further strengthened by the shocking spectrum of examples of attack scenarios effecting education, transport, government and the medical scene. These scenarios reflect the breadth of opportunities for cyber attacks, which I must admit are more numerous than I could imagine.

Specific issues of prevention and response policies are addressed in the final chapter and include the elimination of open handshake protocol and the creation of an Underwriters Laboratory of Security Products.

Although the index is unfortunately rather basic, the book is well bound and easy to read. Cyber Terrorism: Political and Economic Implications is recommended for anybody needing a quick brief on the complexities and realities of cyber‐terrorism − especially busy managers and company executives who need to formulate protection guidelines. The extensive lists of references included with each chapter can offer a deeper as well as more holistic perspective for the interested reader. Although each chapter is introduced by outcomes for the chapter, I would rather use Cyber Terrorism: Political and Economic Implications as orientation reading for graduate as well undergraduate students than as an academic textbook. It can be especially useful in highlighting issues for further thought and discussion.

Related articles