Skip to main content

Adaptive Responses to Cyberterrorism

  • Chapter
  • First Online:
Cyberterrorism
  • 4230 Accesses

Chapter Overview

This chapter explores the conceptual and practical bounds of responses to cyberterrorism, and proposes a model of agile mechanisms for adaptive responses. We propose a methodological approach starting from a taxonomy of responses, based on familiar taxonomies of attacks and threats, and an emerging (socially constructed) understanding of cyberterrorism. We elaborate on two “aligning ideas” for the spectrum of responses—aligning by the type of response (related to its nature) and time-span (aligning responses before, during and after attacks). The approach aims for a holistic policy for countering cyberterrorism, noting that cyberterrorism policy (derived from cyber security policy) points to possible gaps and overlaps of policy literature on counter terrorism. Connecting conceptual and practical responses suggests a “layered” approach ranging from individual level to organizational to national or international responses. We also argue for agile capabilities for a spectrum of responses. Cyberspace is a swiftly evolving environment where protagonists continuously innovate to penetrate, exploit or attack systems. Learning lessons from past incidents is insufficient preparation for unknown futures and threats. Cyberspace is a cyclical competition where both sides learn and adapt, calling for a dynamic model for cyber counter terrorism responses. The proposed model portrays a value-stream from intelligence in cyberspace to cyber-forensics leading to a value chain of preventive and reactive responses. In this model, the effectiveness of deterrence as a measure against cyberterrorism is questioned. A holistic view of responses pulls together various relevant disciplines, e.g., risk management, business continuity, futures studies and scenario planning, red teaming, and operational knowledge management. It calls for investment in education and research by the triad of academia, industry and governments, to create a “cyber security ecosystem.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Further Reading

  • Falessi N et al (2012) National cyber security strategies: practical guide on development and execution. European Network and Information Security Agency (ENISA)

    Google Scholar 

  • Klimburg A (2012) National cyber security framework manual. Estonia: NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)

    Google Scholar 

  • Luiijf E, Besseling K (2013) Nineteen national cyber security strategies. Int J Crit Infrastruct 9(1/2):3–31

    Article  Google Scholar 

References

  • Adams A, Sasse MA (1999) Users are not the enemy. Comm ACM 12(42):40–46

    Article  Google Scholar 

  • Ahmad R, Yunos Z (2012) A dynamic cyber terrorism framework. Int J Comput Sci Inform Secur 10(2):149–158

    Google Scholar 

  • Alkaabi A et al (2010) Dealing with the problem of cybercrime. In: Proceedings of 2nd international ICST conference on digital forensics & cyber crime, Abu Dhabi

    Google Scholar 

  • Ariely G (2006) “Learning to Digest During Fighting – Real Time Knowledge Management,” International Institute for Counter-Terrorism, IDC Herzliya http://www.ict.org.il/Articles/tabid/66/Articlsid/229/currentpage/10/Default.aspx

  • Ariely G (2008) Knowledge management, terrorism, and cyber terrorism. In: Janczewski L, Colarik A (eds) Cyber warfare and cyber terrorism. IGI Global, Hershey

    Google Scholar 

  • Ariely G (2009) Futures of virtual spaces for higher education in the government sector: immersive learning and knowledge exchange. In: Proceedings of OECD conference on higher education spaces & places for learning innovation & knowledge exchange, Riga

    Google Scholar 

  • Arquilla J, Ronfeldt DF (1996) The Advent of Netwar. RAND, Santa Monica

    Google Scholar 

  • Ashton K (2009) That ‘Internet of things’ thing. RFID J. http://www.rfidjournal.com/articles/view?4986. Accessed 4 Aug 2013

  • Averill B, Luiijf EAM (2010) Canvassing the cyber security landscape: why energy companies need to pay attention. J Energ Secur. http://www.ensec.org/index.php?view=article&id=243%3Acanvassing-the-cyber-security-landscapewhy-energy-companies-need-to-pay-attention&option=com_content&Itemid=361. Accessed 24 Jan 2014

  • Azani EY et al (2008) Global jihad groups as learning organizations: overcoming outer-perimeter security obstacles. ICT’s Jihadi Websites Monitoring Group- Insights, International Institute for Counter-Terrorism (ICT)

    Google Scholar 

  • Bayuk JL et al (2012) Cyber security policy guidebook. Wiley, Hoboken

    Book  Google Scholar 

  • Bilge L, Dumitras T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of 2012 ACM conference on computer and communications security

    Google Scholar 

  • Chen TM (2013) An assessment of the department of defense strategy for operating in cyberspace. Strategic Studies Institute, Carlisle

    Google Scholar 

  • Clarke RA, Knake R (2012) Cyber war. HarperCollins, New York

    Google Scholar 

  • Dingledine R et al (2004) Tor: the second-generation onion router. In: Proceedings of 13th USENIX security symposium

    Google Scholar 

  • Don BW et al (2007) Network technologies for networked terrorists: assessing the value of information and communication technologies to modern terrorist organizations. RAND, Santa Monica

    Google Scholar 

  • Ganor B (2001) Defining terrorism: is one man’s terrorist another man’s freedom fighter? http://www.ict.org.il/ResearchPublications/tabid/64/Articlsid/432/Default.aspx. Accessed 4 Aug 2013

  • Ganor B (2009) Terrorism networks: it takes a network to beat a network. In: Kleindorfer R, Wind YJ, Gunther RE (eds) The network challenge: strategy, profit, and risk in an interlinked world. Wharton School, Upper Saddle River, pp 453–470

    Google Scholar 

  • Glaser BG, Strauss AL (1967) The discovery of grounded theory: strategies for qualitative research. Aldine de Gruyter, Hawthorne

    Google Scholar 

  • Goulding C (2002) Grounded theory: a practical guide for management, business and market researchers. Sage, London

    Google Scholar 

  • Howard JD, Longstaff TA (1998) A Common Language for Computer Security Incidents, Livermore, CA, Sandia National Labs

    Google Scholar 

  • ICTAC (International Counter Terrorism Academic Community) founded by Ganor, Institute for Counter Terrorism (ICT) at the Interdisciplinary Center (IDC) Herzliya

    Google Scholar 

  • Jackson BA et al (2007) Breaching the fortress wall: understanding terrorist efforts to overcome defensive technologies. RAND, Santa Monica

    Google Scholar 

  • Jarvis L, Nouri L, Whiting A (2014) Understanding, Locating and Constructing ‘Cyberterrorism’. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Kiltz S et al (2008) Taxonomy for computer security incidents. In: Janczewski L, Colarik A (eds) Cyber warfare and cyber terrorism. IGI Global, Hershey

    Google Scholar 

  • Kuehl DT (2009) Cyberspace and cyberpower. In: Kramer FD, Starr SH, Wentz LK (eds) Cyberpower and national security. National Defense University Press, Washington, DC

    Google Scholar 

  • Kuhn TS (1962) The structure of scientific revolutions. University of Chicago Press, Chicago

    Google Scholar 

  • Libicki MC (2009) Cyberdeterrence and cyberwar. RAND, Santa Monica

    Google Scholar 

  • Locke K (2001) Grounded theory. Sage, London

    Google Scholar 

  • Maurer T (2011) Cyber norm emergence at the United Nations—an analysis of the UN’s activities regarding cyber-security? Belfer Center for Science and International Affairs, Harvard Kennedy School, Cambridge

    Google Scholar 

  • McLuhan M (1966) Understanding media: the extensions of man. McGraw-Hill, London

    Google Scholar 

  • Meyers C et al (2009) Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches. Lawrence Livermore National Security, LLC, Livermore, CA

    Google Scholar 

  • NATO (2011) Assured access to the global commons: maritime, air, space, cyber

    Google Scholar 

  • Nye JS (2010) Cyber power. Harvard Kennedy School, Belfer Center, Cambridge

    Google Scholar 

  • Parkinson NC (1957) Parkinson’s law and other studies in administration. Houghton Mifflin, Boston

    Google Scholar 

  • Saffo P (2013) Disrupting undersea cables: cyberspace’s hidden vulnerability. http://www.acus.org/new_atlanticist/disrupting-undersea-cables-cyberspaces-hidden-vulnerability. Accessed 4 Aug 2013

  • Singer PW (2012) The Cyber Terror Bogeyman. Armed Forces Journal. Washington, D.C.: Brookings Institution. Retrieved from http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer

  • Strauss AL, Corbin JM (1990) Basics of qualitative research: grounded theory procedures and techniques. Sage, Newbury Park

    Google Scholar 

  • Thomas TL (2003) Al Qaeda and the Internet: the danger of ‘cyberplanning’. Parameters Spring 33(1):112–123

    Google Scholar 

  • Thonnard O et al (2012) Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat. Research in attacks, intrusions, and defenses

    Google Scholar 

  • Toffler A (1990) Powershift: knowledge, wealth, and violence at the edge of the 21st century. Bantam Books, New York

    Google Scholar 

  • U.S. Army (2006) FM 3-24/MCWP 3-33.5 Counterinsurgency

    Google Scholar 

  • Veerasamy N, Grobler M (2010) Countermeasures to consider in the combat against cyberterrorism. http://researchspace.csir.co.za/dspace/bitstream/10204/4486/3/Veerasamy3_2010.pdf. Accessed 24 Jan 2014

  • Vorster A, Labuschagne L (2005) A framework for comparing different information security risk analysis methodologies. In: Proceedings of South African Institute for Computer Scientists and Information Technologists (SAICSIT 2005)

    Google Scholar 

  • Warnes R (2014) Modelling terrorism and counter-terrorism. Ph.D. dissertation (forthcoming). University of Surrey, Surrey

    Google Scholar 

  • Weimann G (2005) Cyberterrorism: the sum of all fears? Stud Conflict Terrorism 28:129–149

    Article  Google Scholar 

  • Zittrain J (2006) A history of online gatekeeping. Harv J Law Tech 19(2):253

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gil Ad Ariely .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Ad Ariely, G. (2014). Adaptive Responses to Cyberterrorism. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0962-9_10

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0961-2

  • Online ISBN: 978-1-4939-0962-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics