Abstract
This chapter provides a description of the Asia-Europe Meeting (ASEM) dialogue and cooperation framework, and a definition of cyber terrorism, detailing its current impact. In addition, some classes of cyber threats, protective measures, and possible policy options to achieve cooperation against cyber terrorism and other cyber threats in the Asian region are outlined.
The opinions expressed here are those of the author and should not be construed as representing the opinion of the Council of the European Union, of its General Secretariat, nor of any other European institutions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Notes
A.D. Sofaer, S.E. Goodman, M.F. Cuéllar, E.A. Drozdova et al., ‘A Proposal for an International Convention on Cyber Crime and Terrorism’, The Information Warfare Site (2000). Available at http://www.iwar.org.uk/law/resources/cybercrime/stanford/cisac-draft.htm.
J.A. Lewis, ‘Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats’, Centre for Strategic and International Studies, December 2002. Available at http://www.csis.org/tech/0211-lewis.pdf.
R. Naraine, ‘Massive DDoS Attack Hit DNS Root Servers’, Enterprise, 23 October 2002. Available at http://www.internetnews.com/ent-news/article.php/1486981.
B. Fleck and J. Dimov, Wireless Access Points and ARP Poisoning: Wireless Vulnerabilities that Expose the Wired Network (2001). Available at http://www.cigitallabs.com/resources/papers/download/arppoison.pdf.
US Department of Homeland Security, ‘White Paper. The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63’, Information Analysis and Infrastructure Protection. May 1998. Available at http://www.ciao.gov/publicaffairs/pdd63.html.
The White House, Presidential Executive Order on Critical Infrastructure Protection, 16 October 2001. Available at http://www.whitehouse.gov/news/releases/2001/10/20011016-12.html.
R.A. Kehs, ‘The Radio Frequency Weapons Threat and Proliferation of Radio Frequency Weapons’, Statement before the US Congress Joint Economic Committee, 25 February 1998. Available at http://www.house.gov/jec/hearings/02-25-8h.htm.
The Council of the European Union, ‘Council Resolution of 28 January 2002’, Official Journal of the European Communities, 28 January 2002. Available at http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/c_043/c_04320020216en00020004.pdf
N.R. Mead, R.J. Ellison, R.C. Linger, T. Longstaff and J. McHugh, ‘Survivable Network Analysis Method’, Carnegie Mellon Software Engineering Institute, September 2000. Available at http://www.sei.cmu.edu/publications/documents/00.reports/00tr013/00tr013chap02.html
M.M. Williamson, Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code, 17 June 2002. Available at http://www.hpl.hp.com/techreports/2002/HPL-2002-172.pdf.
Symantec, ‘Understanding and Managing Polymorphic Viruses’, The Symantec Enterprise Papers, vol. XXX (1996). Available at http://www.symantec.com/avcenter/reference/striker.pdf.
The European Commission, ‘Proposal for a Regulation of the European Parliament and of the Council. Establishing the European Network and Information Security Agency’, Commission of the European Communities, 11 February 2003. Available at http://europa.eu.int/information_society/eeurope/news_library/documents/nisa_en.pdf.
Council of European Convention, Convention on Cybercrime, 23 November 2001, http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
Editor information
Editors and Affiliations
Copyright information
© 2006 Massimo Mauro
About this chapter
Cite this chapter
Mauro, M. (2006). Threat Assessment and Protective Measures: Extending the Asia-Europe Meeting IV Conclusions on Fighting International Terrorism and Other Instruments to Cyber Terrorism. In: Halpin, E., Trevorrow, P., Webb, D., Wright, S. (eds) Cyberwar, Netwar and the Revolution in Military Affairs. Palgrave Macmillan, London. https://doi.org/10.1057/9780230625839_13
Download citation
DOI: https://doi.org/10.1057/9780230625839_13
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-54123-2
Online ISBN: 978-0-230-62583-9
eBook Packages: Palgrave Political & Intern. Studies CollectionPolitical Science and International Studies (R0)