2. Cyber terroristism ?
Action that varied as
data and hacking , planning
an cyber attacks , causing
violence or attacking
information systems by
cyber terrorists
3. attackers towards
unlawful attacks
cyber
terrorist ? against computer ,
network and
information system
5. according to the Institute for Security Technology studies
at Darmouth College, cyber terroristism now pose a
significant threat and cyber attacks are increasing in
frequency, scope and sophistication.
6. US Commission on Critical
Infrastructure Protection Notes
noted that neighbouring countries
offer o protection against cyber
terroristism
7. ON YOUR COMPUTER SCRENE !
Without notice it , you had been a
victims of cyber terroristism
15. Koung(1992), Legitimate access to Without refers to
individuals not
establish a the information
system employed by
organization
taxonomy
distinguish Without refers to
collision between
between the Having privileged external and
access to the internal personnel
various sources information system of either a non
technical nature or
of misuse not
16. Model of computer security
Quantity of the different of computer security have
been planned within the literature .
Bell-lapadula Model
Biba Model
Clark Wilson Model
all these model work with CIA framework to stop
misuse by examining individual behavior
17. defending data
confidentiality and
reliability
based on references
disciplines of
psychological &
criminology
recommend some protection against cyber
terrorism
goal oriented of this model are limited for defending
organizations against computer misuse.
19. Straub’s computer security model
(Straub,1986)
First layer : deterrents which
policies of
acceptable or
unacceptable uses of IS
second layer : active measure
(preventives) such as password and
encryption designed to
block intrusions
Third layer : detectives designed to
detect misuses after
that occur so recovery
process can take place
20. Cyber terrorism also give huge
impact on consumer buying
pattern
Negative impacts on
internet security and
consumer buying Impacts on trust
purchase pattern between buyer and
seller transactions
23. 95 % of US consumers polled in a Gartner
Group Survey indicated concerns about
privacy and security when making online
purchases
(saban et al , 2002)
26. Social psychologist define trust as an
expectation about the behavior of others in
transactions, focusing on the contextual
factors that enhance or inhibit the
development and maintenance of trust.
(grabner-kracturer,2002,p.44)
27.
28. Foltz, C. B. (2004). Information Management &
Computer Security. cyberterrorism,computer
crime and reality , 154-165.
Smith, A. D. (2004). Online Information Review.
cybercriminal impacts on online business and
consumer , 224-234.