Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
The Library of Congress > Linked Data Service > LC Subject Headings (LCSH)

Cyberterrorism


  • Here are entered works on attacks or threats of attack against any portion of an information infrastructure.
  • URI(s)

  • Variants

    • Attacks on computers
    • Computer attacks
    • Cyber attacks
    • Cyber terrorism
    • Cyber war
    • Cyberwarfare
    • Electronic terrorism (Cyberterrorism)
  • Broader Terms

  • Narrower Terms

  • Closely Matching Concepts from Other Schemes

  • Sources

    • found: Work cat.: Ogren, J. Responding to the threat of cyberterrorism through information assurance, 2000.
    • found: Network news, March 3, 1999:p. 1 (Leyden, J. Britain battles IT terrorists)
    • found: United States. Congress. Senate. Committee on Governmental Affairs. Cyber attack : is the government safe? 2000, online:opening statement (cyber attacks; computer attacks; from international and domestic terrorists, to crime rings, to everyday hackers)
    • found: TechTarget, viewed June 21, 2019(Cyberterrorism: According to the U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents." Other organizations and experts suggest that many less harmful attacks can also be considered to be acts of cyberterrorism, as long as the attacks are intended to be disruptive or to further the attackers' political stance. In other cases, the differentiation is tied to the outcome of a cyberattack; many infosec experts believe an incident should be considered a cyberterrorism attack if it results in physical harm or loss of life, either directly or indirectly through damage or disruption to critical infrastructure. However, others believe physical harm is not a prerequisite for classifying a cyberattack as a terrorist event. The North Atlantic Treaty Organization (NATO), for example, has defined cyberterrorism as "a cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal." Cyberterrorism is sometimes referred to as electronic terrorism.)
  • LC Classification

    • HV6773.15.C97
  • General Notes

    • Here are entered works on attacks or threats of attack against any portion of an information infrastructure.
  • Instance Of

  • Scheme Membership(s)

  • Collection Membership(s)

  • Change Notes

    • 2001-02-21: new
    • 2019-06-21: revised
  • Alternate Formats