Skip to main content
Contribution to Book
Understanding the Methods behind Cyber Terrorism
Encyclopedia of Information Science and Technology (2015)
  • Maurice E Dawson, Jr.
  • Marwan Omar
  • Jonathan Abramson, Colorado Technical University

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of warfare removes the need to have a physically capable military and requires the demand for a force that has a strong technical capacity e.g. computer science skills. The U.S. and other countries have come to understand that this is an issue and has developed policies to handle this in an effort to mitigate the threats.

In Estonia and Georgia there were direct attacks on government cyber infrastructure (Beildleman, 2009). The attacks in Estonia rendered the government’s infrastructure useless. The government and other associated entities heavily relied upon this e-government infrastructure. These attacks help lead to the development of cyber defense organizations within Europe.

  • cyber security,
  • cyber terrorism,
  • digital crime,
  • cyber,
  • computer security,
  • information assurance,
  • systems security,
  • security engineering
Publication Date
Mehdi Khosrow-Pour
Information Science Reference
Citation Information
Maurice E Dawson, Marwan Omar and Jonathan Abramson. "Understanding the Methods behind Cyber Terrorism" ThirdHersheyEncyclopedia of Information Science and Technology (2015)
Available at: