Hirenkumar Thakor,
Bhavin Mehta,
- Associate Professor, Faculty of Computer Application, Noble University, Junagadh, Gujarat, India
- Associate Professor, Faculty of Computer Application, Noble University, Junagadh, Gujarat, India
Abstract
The paper offers a detailed study of cyber security intimidations, cyber extremism, and cyber warfare in the worldwide context. It touches upon the progress of cyber intimidations from discrete hackers to state-supported actors, exploratory mutual attack vectors such as malware and phishing. The conversation probes into the features of cyber extremism and the inspirations driving such actions. Besides, it clarifies the idea of cyber warfare, as well as strategies and case studies of distinguished occurrences. Lawful and moral deliberations in cyberspace, together with mitigation tactics and upcoming opportunities, are also scrutinized. Through producing historical viewpoints, existing difficulties, and projected growths, the paper emphasizes the imperative for cooperative exertions to improve cyber flexibility and combat evolving intimidations.
Keywords: Cyber flexibility, attack vectors, state-supported actors, malicious actors, cooperative efforts
[This article belongs to International Journal of Information Security Engineering (ijise)]
Hirenkumar Thakor, Bhavin Mehta. Cyber Threats Unveiled: From Terrorism to Warfare. International Journal of Information Security Engineering. 2025; 03(01):7-18.
Hirenkumar Thakor, Bhavin Mehta. Cyber Threats Unveiled: From Terrorism to Warfare. International Journal of Information Security Engineering. 2025; 03(01):7-18. Available from: https://journals.stmjournals.com/ijise/article=2025/view=0
References
- Eling M, McShane M, Nguyen T. Cyber risk management: history and future research directions. Risk Manage Insurance Rev. 2021; 24 (1): 93–125.
- Bhosale KS, Nenova M, Iliev G. A study of cyber attacks: in the healthcare sector. In: 2021 Sixth Junior Conference on Lighting (Lighting), Gabrovo, Bulgaria, September 23–25, 2021. pp. 1–6.
- Nagpal R. Evolution of Cyber Crimes. Pune, India: Asian School of Cyber Laws; 2008.
- Başeskioğlu MÖ, Tepecik A. Cybersecurity, computer networks phishing, malware, ransomware, and social engineering anti-piracy reviews. In: 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, June 11–13, 2021. pp. 1–5.
- Razaulla S, Fachkha C, Markarian C, Gawanmeh A, Mansoor W, Fung BC, Assi C. The age of ransomware: a survey on the evolution, taxonomy, and research directions. IEEE Access. 2023; 11: 40698–40723.
- Andini OP. Cyber terrorism criminal acts in the perspective of transnational organized crime. Unnes Law J. 2021; 7 (2): 333–346.
- Ludvigsen KR, Nagaraja S, Daly A. Preventing or mitigating adversarial supply chain attacks: a legal analysis. In: Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, Los Angeles, CA, USA, November 7, 2022. pp. 25–34.
- Martínez J, Durán JM. Software supply chain attacks, a threat to global cybersecurity: SolarWinds’ case study. Int J Safety Security Eng. 2021; 11 (5): 537–545.
- Kumar GI. Cyber security system and policy of India: challenges and prospects. Soc Sci. 2019; 6 (7): 1937–1943.
- Ghate S, Agrawal PK. A literature review on cyber security in Indian context. J Comput Inform. Technol. 2017; 8 (5): 30–36.
- Singh JP. Advancing edge security: AI and ML innovations for robust cyber defense. Int J Market Technol. 2024; 14 (2): 1–14.
- Chen P, Desmet L, Huygens C. A study on advanced persistent threats. In: Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25–26, 2014. Proceedings 15 2014. Berlin, Germany: Springer; 2014. pp. 63–72.
- Gajjar VR, Taherdoost H. Cybercrime on a global scale: trends, policies, and cybersecurity strategies. In: 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI), Lalitpur, Nepal, January 18–19, 2024. pp. 668–676.
- Leventopoulos S, Pipyros K, Gritzalis D. Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law. Int Cybersecurity Law Rev. 2024; 5 (2): 237–262.
- Sharma N, Kumar A. Legal framework for developing and implementing robust cybersecurity policies in India. J ReAttach Ther Dev Diversities. 2024; 7 (2): 152–158.
- Farwell JP, Rohozinski R. Stuxnet and the future of cyber war. Survival. 2011; 53 (1): 23–40.
- Lika RA, Murugiah D, Brohi SN, Ramasamy D. NotPetya: cyber attack prevention through awareness via gamification. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, Malaysia, July 11–12, 2018. pp. 1–6.
- Grubbs R, Stoddard J, Freeman S, Fisher R. Evolution and trends of industrial control system cyber incidents since 2017. J Crit Infrastruct Policy. 2021; 2 (2): 45–79.
- Murisa W, Coetzee M. Strengthening aviation cybersecurity with security operations centres. In: International Conference on Cyber Warfare and Security, Johannesburg, South Africa, March 26–27, 2024. Vol. 19, No. 1, pp. 481–489.
- Husari G, Niu X, Chu B, Al-Shaer E. Using entropy and mutual information to extract threat actions from cyber threat intelligence. In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Miami, FL, USA, November 9–11, 2018. pp. 1–6.
- Wilson R, Fitz A. Nuclear weapons, cyber warfare, and cyber security: ethical and anticipated ethical issues. In: International Conference on Cyber Warfare and Security, Towson, MD, USA, March 9–10, 2023. Vol. 18, No. 1, pp. 440–448.
International Journal of Information Security Engineering
Volume | 03 |
Issue | 01 |
Received | 20/12/2024 |
Accepted | 29/12/2024 |
Published | 12/02/2025 |
Publication Time | 54 Days |
async function fetchCitationCount(doi) {
let apiUrl = `https://api.crossref.org/works/${doi}`;
try {
let response = await fetch(apiUrl);
let data = await response.json();
let citationCount = data.message[“is-referenced-by-count”];
document.getElementById(“citation-count”).innerText = `Citations: ${citationCount}`;
} catch (error) {
console.error(“Error fetching citation count:”, error);
document.getElementById(“citation-count”).innerText = “Citations: Data unavailable”;
}
}
fetchCitationCount(“10.37591/IJISE.v03i01.0”);