ICT Cyber-Desk Review  
 
 
Order by:

5/3/2014 Cyber-Terrorism Activities Report No. 6

ICT Cyber-Desk

This report covers two main subjets: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report


23/12/2013 Cyber-Terrorism Activities Report No. 5

ICT Cyber-Desk

This report covers two main subjets: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report:


21/10/2013 Cyber-Terrorism Activities Report No. 4

ICT Cyber-Desk

This report covers two main subjets: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report:

 


20/6/2013 Cyber-Terrorism Activities Report No. 3

ICT Cyber-Desk

This report covers two main subjets: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report.

 


25/4/2013 ICT Cyber-Desk Review: Report #2

ICT Cyber-Desk

The second cyber-desk report addresses two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it has been linked to jihad (funding, methods of attack).


24/1/2013 ICT Cyber-Desk Review: Report #1

ICT Cyber-Desk

Cyberspace has become an important battlefield, and an integral part of current and future conflicts. Recent years have seen increasing cyber-attacks on political targets, crucial infrastructure, and the Web sites of commercial corporations. These attacks, which are also, increasingly, receiving international attention, are perpetrated by nation-state actors (which do not take responsibility for them); groups of hackers (such as Anonymous); criminal organizations; and lone hackers. Nation-state actors are becoming ever more aware of the cyber threat, and are assessing its effect on their national security. To this end, many of them are finding (and funding) ways to develop the defense mechanisms to cope with the threat, as well as their own offensive capabilities.



 
 
 
בניית אתריםבניית אתרים