Understanding Cybersecurity Law and Digital Privacy by Melissa Lukings & Arash Habibi Lashkari

Understanding Cybersecurity Law and Digital Privacy by Melissa Lukings & Arash Habibi Lashkari

Author:Melissa Lukings & Arash Habibi Lashkari
Language: eng
Format: epub
ISBN: 9783030887049
Publisher: Springer International Publishing


3.1.4.2 Capability and Motivation of Attacker

If we accept that critical infrastructures are vulnerable to a cyberterrorist attack, then the question becomes whether there are malicious actors with the capability and motivation to carry out such an operation. While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm. Conversely, terrorists who are motivated to cause violence seem to lack the capability or motivation to cause that degree of damage in cyberspace [41].

Levels of Cyberterror Capability

The Center for the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School in Monterey, California—the Monterey group—issued a report titled “Cyberterror: Prospects and Implications,” with the goal of improving articulation of the demand side of terrorism. Specifically, they assessed the prospects of terrorist organizations pursuing cyberterrorism. They concluded that the barrier to entry for anything beyond annoying hacks is quite high and that terrorists generally lack the wherewithal and human capital needed to mount a meaningful operation.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.