Skip to main content

Cyberterrorism Attacks on Critical Infrastructure and Aviation: Criminal and Legal Policy of Countering

  • Conference paper
  • First Online:
Integrated Computer Technologies in Mechanical Engineering - 2020 (ICTM 2020)

Abstract

Analysis of scientific opinions on the content of criminal law policy for countering cyberterrorist attacks on critical infrastructure and aviation. Scientifically substantiated recommendations concerning the directions of counteraction to cyber incidents are given and the innovation development algorithm for the needs of law enforcement agencies is offered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Patel, A., Tailor, J.: A malicious activity monitoring mechanism to detect and prevent ransomware. Comput. Fraud Secur. 2020(1), 14–19 (2020). https://doi.org/10.1016/S1361-3723(20)30009-9

    Article  Google Scholar 

  2. Katerynchuk, P.: Challenges for Ukraine’s cyber security: national dimensions. Eastern Rev. 8, 137–147 (2019). https://doi.org/10.18778/1427-9657.08.05

    Article  Google Scholar 

  3. Taplin, R.: Cyber Risk, Intellectual Property Theft and Cyberwarfare: Asia, Europe and the USA. Routledge, London (2020). https://doi.org/10.4324/9780429453199

    Book  Google Scholar 

  4. ITU: Global cybersecurity index 2018. International Telecommunication Union, Geneva (2019)

    Google Scholar 

  5. Hamden, R.H.: Psychology of Terrorists: Profiling and Counteraction. CRC Press, Boca Raton (2018). https://doi.org/10.4324/9781315156750

  6. Scrivens, R., Gill, P., Conway, M.: The role of the internet in facilitating violent extremism and terrorism: suggestions for progressing research. In: Holt, T., Bossler, A. (eds.) The Palgrave Handbook of International Cybercrime and Cyberdeviance, pp. 1417–1435. Palgrave Macmillan, Cham (2020). https://doi.org/10.1007/978-3-319-78440-3_61

  7. Weisburd, D., Farrington, D.P., Gill, C.: What works in crime prevention and rehabilitation: an assessment of systematic reviews. Criminol. Public Policy 16(2), 415–449 (2017). https://doi.org/10.1111/1745-9133.12298

    Article  Google Scholar 

  8. Harrison, K.: Penology: Theory, Policy and Practice. Red Globe Press, London (2020)

    Google Scholar 

  9. Verkhovna Rada of Ukraine: On fight against terrorism. The law of Ukraine. https://zakon.rada.gov.ua/laws/show/638-15. Accessed 20 Sep 2020. (in Ukrainian)

  10. Verkhovna Rada of Ukraine: On basic principles of cyber security support in Ukraine. The law of Ukraine. https://zakon.rada.gov.ua/laws/show/2163-19. Accessed 20 Sep 2020. (in Ukrainian)

  11. Stefoff, R.: The Patriot Act. Marshall Cavendish Benchmark, New York (2011)

    Google Scholar 

  12. Pitaksantayothin, J.: Cyber terrorism laws in the United States, the United Kingdom and Thailand: a comparative study. Chulalongkorn Law J. 32(2), 169–185 (2014)

    Google Scholar 

  13. Fox, S.J.: Flying challenges for the future: aviation preparedness – in the face of cyber-terrorism. J. Transp. Secur. 9(3–4), 191–218 (2016). https://doi.org/10.1007/s12198-016-0174-1

    Article  Google Scholar 

  14. Mayer Lux, L.: Defining cyberterrorism. Revista Chilena de Derecho y Tecnología 7(2), 5–25 (2018). https://doi.org/10.5354/0719-2584.2018.51028

    Article  Google Scholar 

  15. Verkhovna Rada of Ukraine: Criminal code of Ukraine. The law of Ukraine. https://zakon.rada.gov.ua/laws/show/2341-14. Accessed 20 Sep 2020. (in Ukrainian)

  16. UNODC: Good practices in supporting victims of terrorism within the criminal justice framework. United Nations, New York (2015)

    Google Scholar 

  17. Tronc, E., Nahikian, A.: Ukraine-conflict in the Donbas: civilians hostage to adversarial geopolitics. Harvard Humanitarian Initiative (2020). https://doi.org/10.2139/ssrn.3657394

    Article  Google Scholar 

  18. Basha, L.A.: Overview on recent developments for the legislation, regulatory and anti-money laundering US update. Trusts Trustees 25(1), 138–148 (2019). https://doi.org/10.1093/tandt/tty173

    Article  Google Scholar 

  19. Thomas, C.S., Kirby, M.J.: The Convention for the suppression of unlawful acts against the safety of civil aviation. Int. Comp. Law Q. 22(1), 163–172 (1973). https://doi.org/10.1093/iclqaj/22.1.163

    Article  Google Scholar 

  20. Oster, C.V., Jr., Strong, J.S., Zorn, C.K.: Analyzing aviation safety: problems, challenges, opportunities. Res. Transp. Econ. 43(1), 148–164 (2013). https://doi.org/10.1016/j.retrec.2012.12.001

    Article  Google Scholar 

  21. ICAO Doc 9896. Manual on the Aeronautical Telecommunication Network (ATN) using Internet Protocol Suite (IPS) Standards and Protocol. International Civil Aviation Organization, Montreal (2015)

    Google Scholar 

  22. Stevenson, B.: EasyJet tests UAV with A320 inspection. FlightGlobal (2015). https://www.flightglobal.com/easyjet-tests-uav-with-a320-inspection/117108.article. Accessed 20 Sep 2020

  23. Airbus: Airbus demonstrates aircraft inspection by drone at Farnborough (2016). https://www.airbus.com/newsroom/press-releases/en/2016/07/airbus-demonstrates-aircraft-inspection-by-drone-at-farnborough.html. Accessed 20 Sep 2020

  24. Lee, J., Mo, J.: Analysis of technological innovation and environmental performance improvement in aviation sector. Int. J. Environ. Res. Public Health 8(9), 3777–3795 (2011). https://doi.org/10.3390/ijerph8093777

    Article  Google Scholar 

  25. Harust, Y.V., Melnyk, V.I.: Law Enforcement Agencies on Protection of Economic Security of Ukraine Administrative and Legal Aspect. Sumy State University, Sumy (2019)

    Google Scholar 

  26. Verkhovna Rada of Ukraine: Strategy for the development of innovative activity for the period up to the year 2030. Order of the Cabinet of Ministers of Ukraine. https://zakon.rada.gov.ua/laws/show/526-2019-%D1%80. Accessed 20 Sep 2020. (in Ukrainian)

  27. Shypovskyi, V., Cherneha, V., Marchenkov, S.: Analysis of the ways of improvement of Ukraine–NATO cooperation on cybersecurity issues. Soc. Dev. Secur. 10(2), 11–15 (2020). https://doi.org/10.33445/sds.2020.10.2.2

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nataliia Filipenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nechyporuk, M., Pavlikov, V., Filipenko, N., Spitsyna, H., Shynkarenko, I. (2021). Cyberterrorism Attacks on Critical Infrastructure and Aviation: Criminal and Legal Policy of Countering. In: Nechyporuk, M., Pavlikov, V., Kritskiy, D. (eds) Integrated Computer Technologies in Mechanical Engineering - 2020. ICTM 2020. Lecture Notes in Networks and Systems, vol 188. Springer, Cham. https://doi.org/10.1007/978-3-030-66717-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66717-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66716-0

  • Online ISBN: 978-3-030-66717-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics