Skip to main content

Threat Assessment and Protective Measures: Extending the Asia-Europe Meeting IV Conclusions on Fighting International Terrorism and Other Instruments to Cyber Terrorism

  • Chapter
  • 176 Accesses

Abstract

This chapter provides a description of the Asia-Europe Meeting (ASEM) dialogue and cooperation framework, and a definition of cyber terrorism, detailing its current impact. In addition, some classes of cyber threats, protective measures, and possible policy options to achieve cooperation against cyber terrorism and other cyber threats in the Asian region are outlined.

The opinions expressed here are those of the author and should not be construed as representing the opinion of the Council of the European Union, of its General Secretariat, nor of any other European institutions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. A.D. Sofaer, S.E. Goodman, M.F. Cuéllar, E.A. Drozdova et al., ‘A Proposal for an International Convention on Cyber Crime and Terrorism’, The Information Warfare Site (2000). Available at http://www.iwar.org.uk/law/resources/cybercrime/stanford/cisac-draft.htm.

    Google Scholar 

  2. J.A. Lewis, ‘Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats’, Centre for Strategic and International Studies, December 2002. Available at http://www.csis.org/tech/0211-lewis.pdf.

    Google Scholar 

  3. R. Naraine, ‘Massive DDoS Attack Hit DNS Root Servers’, Enterprise, 23 October 2002. Available at http://www.internetnews.com/ent-news/article.php/1486981.

    Google Scholar 

  4. B. Fleck and J. Dimov, Wireless Access Points and ARP Poisoning: Wireless Vulnerabilities that Expose the Wired Network (2001). Available at http://www.cigitallabs.com/resources/papers/download/arppoison.pdf.

    Google Scholar 

  5. US Department of Homeland Security, ‘White Paper. The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63’, Information Analysis and Infrastructure Protection. May 1998. Available at http://www.ciao.gov/publicaffairs/pdd63.html.

    Google Scholar 

  6. The White House, Presidential Executive Order on Critical Infrastructure Protection, 16 October 2001. Available at http://www.whitehouse.gov/news/releases/2001/10/20011016-12.html.

    Google Scholar 

  7. R.A. Kehs, ‘The Radio Frequency Weapons Threat and Proliferation of Radio Frequency Weapons’, Statement before the US Congress Joint Economic Committee, 25 February 1998. Available at http://www.house.gov/jec/hearings/02-25-8h.htm.

    Google Scholar 

  8. The Council of the European Union, ‘Council Resolution of 28 January 2002’, Official Journal of the European Communities, 28 January 2002. Available at http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/c_043/c_04320020216en00020004.pdf

    Google Scholar 

  9. N.R. Mead, R.J. Ellison, R.C. Linger, T. Longstaff and J. McHugh, ‘Survivable Network Analysis Method’, Carnegie Mellon Software Engineering Institute, September 2000. Available at http://www.sei.cmu.edu/publications/documents/00.reports/00tr013/00tr013chap02.html

    Google Scholar 

  10. M.M. Williamson, Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code, 17 June 2002. Available at http://www.hpl.hp.com/techreports/2002/HPL-2002-172.pdf.

    Google Scholar 

  11. Symantec, ‘Understanding and Managing Polymorphic Viruses’, The Symantec Enterprise Papers, vol. XXX (1996). Available at http://www.symantec.com/avcenter/reference/striker.pdf.

    Google Scholar 

  12. The European Commission, ‘Proposal for a Regulation of the European Parliament and of the Council. Establishing the European Network and Information Security Agency’, Commission of the European Communities, 11 February 2003. Available at http://europa.eu.int/information_society/eeurope/news_library/documents/nisa_en.pdf.

    Google Scholar 

  13. Council of European Convention, Convention on Cybercrime, 23 November 2001, http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2006 Massimo Mauro

About this chapter

Cite this chapter

Mauro, M. (2006). Threat Assessment and Protective Measures: Extending the Asia-Europe Meeting IV Conclusions on Fighting International Terrorism and Other Instruments to Cyber Terrorism. In: Halpin, E., Trevorrow, P., Webb, D., Wright, S. (eds) Cyberwar, Netwar and the Revolution in Military Affairs. Palgrave Macmillan, London. https://doi.org/10.1057/9780230625839_13

Download citation

Publish with us

Policies and ethics