Terorisme siber: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
k menghapus Kategori:Terorisme berdasarkan metode; menambahkan Kategori:Terorisme menurut metode menggunakan HotCat |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.3 |
||
(11 revisi perantara oleh 6 pengguna tidak ditampilkan) | |||
Baris 1:
{{terorisme}}
'''Terorisme
Terorisme
Terorisme
Ada banyak [[Kritik terhadap Terorisme Perang#Peran dari media A.S.|kekhawatiran]] dari sumber pemerintah dan media tentang potensi kerusakan yang bisa diakibatkan oleh terorisme
Ada beberapa kejadian besar dan kecil dari terorisme
== Lihat pula ==
Baris 30:
== Bacaan lebih lanjut ==
* {{cite book | author=Alexander, Yonah Swetman, Michael S. | title=Cyber Terrorism and Information Warfare: Threats and Responses | url=https://archive.org/details/cyberterrorismin0000unse | publisher=Transnational Publishers Inc.,U.S. | year=2001 | isbn=1-57105-225-9}}
* Bibi van Ginkel, [http://www.icct.nl/publications/icct-commentaries/the-internet-as-hiding-place-of-jihadi-extremists "The Internet as Hiding Place of Jihadi Extremists" (International Centre for Counter-Terrorism – The Hague, 2012)] {{Webarchive|url=https://web.archive.org/web/20141029203936/http://www.icct.nl/publications/icct-commentaries/the-internet-as-hiding-place-of-jihadi-extremists |date=2014-10-29 }}
* {{cite book | author=Colarik, Andrew M. | title=Cyber Terrorism: Political and Economic Implications | publisher=Idea Group, U.S. | year=2006 | isbn=1-59904-022-0}}
* {{cite journal | last1 = Hansen | first1 = James V. | last2 = Benjamin Lowry | first2 = Paul | last3 = Meservy | first3 = Rayman | last4 = McDonald | first4 = Dan | year = 2007 | title = Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection | ssrn = 877981 | journal = Decision Support Systems | volume = 43 | issue = 4| pages = 1362–1374 | doi = 10.1016/j.dss.2006.04.004 }}
* {{cite book | author=Verton, Dan | title=Black Ice: The Invisible Threat of Cyber-terrorism | url=https://archive.org/details/blackiceinvisibl0000vert | publisher=Osborne/McGraw-Hill, U.S. | year=2003 | isbn=0-07-222787-7}}
* {{cite book | author=Weimann, Gabriel | title=Terror on the Internet: The New Arena, the New Challenges | url=https://archive.org/details/terroroninternet00weim | publisher=United States Institute of Peace, U.S. | year=2006 | isbn=1-929223-71-4}}
* {{cite web |last=Blau |first= John |date=November 2004 |title=The battle against cyberterror |work=NetworkWorld |accessdate=March 20, 2005 |url=http://www.nwfusion.com/supp/2004/cybercrime/112904terror.html}}
* {{cite web |last=Gross |first= Grant |date=Nov 2003 |title=Cyberterrorist attack would be more sophisticated that past worms, expert says |publisher=ComputerWorld |accessdate=March 17, 2005 |url=http://www.computerworld.com/securitytopics/security/story/0,10801,86857,00.html}}
* {{cite web |last=Poulsen |first=Kevin |date=August 2004 |title=South Pole 'cyberterrorist' hack wasn't the first |publisher= SecurityFocus News |accessdate= March 17, 2005 |url=http://www.securityfocus.com/news/9356}}
* {{cite web |last=Thevenet |first= Cédric |date=November 2005 |title=Cyberterrorisme, mythe ou réalité? |language=French |publisher=terrorisme.net |format=PDF |url= http://www.terrorisme.net/pdf/2006_Thevenet.pdf}}
* U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02
* {{cite web |last=Rayamajhi |first=shreedeep |date= 2009 |title=Research Paper -A Synopsis on Cyber Terrorism and Warfare |publisher= Scribd |accessdate= |url=https://www.scribd.com/document/24366844/Research-Paper-A-Synopsis-on-Cyber-Terrorism-and-Warfare-by-Shreedeep-Rayamajhi}}
* {{cite book| title=Cyberterrorism| url=https://archive.org/details/cyberterrorism0000chin| author=Jacqueline Ching| publisher=Rosen Pub Group| year=2010| isbn=1-4358-8532-5}}
* Rolón, Darío N., (2013) [http://de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet Control, vigilancia y respuesta penal en el ciberespacio], Latinamerican´s new security thinking, Clacso.
* {{cite book|last1=Costigan|first1=Sean|title=Cyberspaces and Global Affairs|date=2012|publisher=Ashgate|isbn=978-1-4094-2754-4|url=http://www.ashgate.com/isbn/9781409427544|access-date=2017-07-02|archive-date=2015-04-02|archive-url=https://web.archive.org/web/20150402101032/http://www.ashgate.com/isbn/9781409427544|dead-url=yes}}
== Pranala luar ==
=== Umum ===
* [https://fas.org/irp/crs/RL32114.pdf CRS Report for Congress – Computer Attack and Cyber Terrorism] – 17/10/03
* [http://antivirus.about.com/library/weekly/aa090502a.htm Cyber-Terrorism: Propaganda or Probability?] {{Webarchive|url=https://web.archive.org/web/20110724183823/http://antivirus.about.com/library/weekly/aa090502a.htm |date=2011-07-24 }}
* [http://www.abc.net.au/rn/scienceshow/stories/2007/1885902.htm#transcript How terrorists use the Internet] Wawancara ABC Australia dengan Profesor [[Hsinchun Chen]]
* [http://www.dc3.mil Department of Defense Cyber Crime Center]
* [http://www.defcon.org defcon.org] {{Webarchive|url=https://web.archive.org/web/20190928033849/https://www.defcon.org/ |date=2019-09-28 }}
* [http://www.racd.org/ RedShield Association- Cyber Defense] {{Webarchive|url=https://web.archive.org/web/20170623014516/http://racd.org/ |date=2017-06-23 }}
* Cyber Infrastructure Protection – Strategic Studies Institute
* [http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1067 strategicstudiesinstitute.army.mil]
* [http://www.newageislam.com/islam,terrorism-and-jihad/sultan-shahin,-editor,-new-age-islam/cyber-terrorism-and-freedom-of-expression--sultan-shahin-asks-united-nations-to-redesign-internet-governance/d/8789 Cyber-Terrorism and Freedom of Expression: Sultan Shahin Asks United Nations to Redesign Internet Governance] [[New Age Islam]]
* [http://digital.library.unt.edu/ark:/67531/metadc4847/ Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment]
=== Berita ===
* [https://www.fbi.gov/news/stories/2014/october/cyber-security-task-force-takes-whole-government-approach/ Cyber Security Task Force Takes ‘Whole Government’ Approach] {{Webarchive|url=https://web.archive.org/web/20160602221423/https://www.fbi.gov/news/stories/2014/october/cyber-security-task-force-takes-whole-government-approach |date=2016-06-02 }} [[FBI]], 20 Oktober 2014
* [http://news.bbc.co.uk/1/hi/world/americas/6197446.stm BBC News – US warns of al-Qaeda cyber threat] – 01/12/06
* [http://news.bbc.co.uk/1/hi/technology/2850541.stm BBC News – Cyber terrorism 'overhyped'] – 14/03/03
{{Authority control}}
{{DEFAULTSORT:siber, Terorisme}}
[[Kategori:Perang dunia maya]]
[[Kategori:Kejahatan dunia maya]]
|