You are here: Home Contents V18 N3 V18N3_Rabie.html
Personal tools

Cyber Terrorism: A Critical Assessment of the Threat Landscape and Countermeasures



Full text

Journal of Information Systems Security
Volume 18, Number 3 (2022)
Pages 155165
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Osama Rabie — FCIT, King Abdulaziz University, Jeddah, Kingdom of Saudi Arabia
Information Institute Publishing, Washington DC, USA




This paper examines the impact of the internet on dissemination of harmful content, with a specific focus on the issue of cyberterrorism. We define the term cyber "terrorist" within the context of violent followers of a particular ideology and emphasizes the importance of understanding the difference between legitimate self-defense and violent extremist actions to effectively combat cyberterrorism. To address this growing threat, the paper discusses various measures taken by governments to counter cyberterrorism, including investing in research, securing critical infrastructure, enacting laws to criminalize cybercrime, and taking proactive measures to disrupt terrorist activity online. The paper also highlights the need for a multidisciplinary approach involving education, technology, and public awareness to combat this threat.




Cyberterrorism, Cybersecurity, Countermeasures, Threats, Vulnerabilities.




Crosbie, M. and Spafford, E. H. "Defending a Computer System Using Autonomous Agents" (1995). Department of Computer Science Technical Reports. Paper 1200.

Dhillon, G., Oliveira, T., Susarapu, S., and Caldeira, M. (2016). Deciding between information security and usability: Developing value-based objectives. Computers in Human Behavior, 61, 656-666.

Dhillon, S. (2021). Zoombombing: hype and reality. Journal of Information System Security, 17(3).

Dhillon, S. and Nunes, S. (2020). Interpreting individual values for information privacy and security. Journal of Information System Security, 16(3).

Forrest, S., Somayaji, A., and Ackley, D. H. (1997). Building diverse computer systems. In Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133) (pp. 67-72). IEEE.

Fovino, I. N., Guidi, L., Masera, M., and Stefanini, A. (2011). Cyber security assessment of a power plant. Electric Power Systems Research, 81(2), 518-526.

Hansen, J. V., Lowry, P. B., Meservy, R. D., and McDonald, D. M. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362-1374.

Lee, S., Huh, JH. (2019). An effective security measures for nuclear power plant using big data analysis approach. The Journal of Supercomputing, 75(8), 4267–4294.

Papadimitriou, F. (2009). A nexus of Cyber-Geography and Cyber-Psychology: Topos/“Notopia” and identity in hacking. Computers in Human Behavior, 25(6), 1331-1334.

Smith, K. and Dhillon, G. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research, 33(1), 84-123.

Wynn, E. and Katz, J. (1997). Hyperbole over cyberspace: Self-presentation and social boundaries in Internet home pages and discourse. The Information Society, 13(4), 297-327.