Font Size: a A A

Research On Issues Related To Cyberterrorism Activities

Posted on:2017-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:B J LiFull Text:PDF
GTID:2336330485997980Subject:Investigation
Abstract/Summary:PDF Full Text Request
The rapid development of information networks, brings great convenience to the socio-economic, and other aspects of life at the same time, due to its vulnerability to serious threat to national security.Terrorist groups also learned to take advantage of the networks in the information age, armed and strengthened its own, spawned new type--cyberterrorism. As to national management, social life become more independent on information networks and the vulnerability of network status itself has not been resolved, there is urgent need and practice to safeguard national security and social stability to study on cyber-terrorism.This paper consist of four chapters. The introduction part is about choosing the topic. The chapter I introduces the general situation of cyber-terrorism, including definitions, forms, targeted content.Chapter II focuses on data security, the one of key issues on the defense of terrorists using the Internet to carry out terrorist acts, analyzes the current situation of data protection and the difficulties of taking data protection measures and the network vulnerabilities that terrorist organizations exploit to.Money is an integral part of its own development and armed elements.Chapter III focuses on terrorist financing by means of cyber laundering. application complexity of virtualization, cyberspace, anonymous features, make the real identity of terrorists can not easily be found, making it difficult to achieve the timely hit with sanctions.Earlier in the fourth chapter summarizes the discussion.Due to the virtual space to track terrorist organizations against difficult, expensive, and effectiveness is not significant, compared against control tracking role to combat more prevented terrorist activities.But the current network uses wide, regardless of country, economic and trade, and social life are inseparable from the network information system.Therefore, the work involved is quite large, to establish a comprehensive prevention and control system of nature is not easy.
Keywords/Search Tags:Cyberterrorism Activities, Data Security, Cyber Laundering, Terrorist Financing
PDF Full Text Request
Related items