The mimetic virus: A vector for cyber security

dc.cclicenceN/Aen
dc.contributor.authorAyres, Nicholasen
dc.contributor.authorMaglaras, Leandrosen
dc.contributor.authorJanicke, Helgeen
dc.contributor.authorSmith, Richarden
dc.contributor.authorHe, Yingen
dc.date.acceptance2016-03-05en
dc.date.accessioned2016-04-08T09:52:06Z
dc.date.available2016-04-08T09:52:06Z
dc.date.issued2016
dc.description.abstractLike conventional terrorism, cyberterrorism has the same aims and goals but the act is done exclusively within cyberspace where the computer is both weapon and target. Unlike conventional terrorism, cyberterrorism is not analogue but digital and any potential attack could have global consequences. Current thinking is that Critical National Infrastructure (CNI) is the main target of focus for cyberterrorism but with so many people online on a national or even global scale, public could prove to be an easier, more tempting target. This article addresses how the cyberterrorist could use the public as target of a real or fake attack by using a mimetic virus as the weapon.en
dc.funderN/Aen
dc.identifier.citationAyres, N. et al. (2016) The mimetic virus: A vector for cyber security. International Journal of Business Continuity and Risk Management, online firsten
dc.identifier.doihttps://doi.org/10.1504/ijbcrm.2016.081256
dc.identifier.issn1758-2172
dc.identifier.urihttp://hdl.handle.net/2086/11846
dc.language.isoenen
dc.peerreviewedYesen
dc.projectidN/Aen
dc.publisherInderscienceen
dc.researchgroupCyber Security Centreen
dc.researchinstituteCyber Technology Institute (CTI)en
dc.subjectMimetic virusen
dc.subjectcyber terrorismen
dc.titleThe mimetic virus: A vector for cyber securityen
dc.typeArticleen

Files

License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.2 KB
Format:
Item-specific license agreed upon to submission
Description: