This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Muhammad Aftab Khalid,

Ahthasham Sajid,

Fariha Shoukat,
- Student, Department of Computer Science, Faculty of ICT, Baluchistan University of Information Technology Engineering and Management Sciences, Quetta, Baluchistan, Pakistan
- Assistant Professor, Department of Information Security, Riphah Institute of Systems Engineering, Riphah International University, Islamabad, Pakistan
- Student, Department of Data Science, Riphah Institute of Systems Engineering, Riphah International University, Islamabad, Pakistan
Abstract document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_abs_110326’);});Edit Abstract & Keyword
Cyber technology is frequently utilized to share information and data and to develop a communication with a nearly infinite audience. This technology has developed a worldwide network. As a contemporary military instrument, cyber technology has the potential to be used in a variety of ways. Today’s cyber warfare dangers might be encountered in a variety of ways since modern Cyber warfare has taken a backseat to physical war techniques in the twenty-first century. Extremist groups may also utilize it to spread their religious beliefs. The goal of the dissemination is to generate public support for the terrorist cause and distribute the message. To find and connect with like-minded individuals from across the globe, it is quite inexpensive to use the Internet. Additionally, it aids in terrorism-related activities such as fundraising, propaganda, training, and inciting. The ease with which young people can access cyber technology can lead to radicalization in just a few minutes. The potential of cyber technology to promote information and idea sharing—which is acknowledged as a fundamental human right—is just one of its many advantages. To be clear, the same technology may be used to assist terrorism or to incite hatred and violence in society. One problem in the fight against terrorism is the use of cyber technology for radicalization and terrorism.
Keywords: Cyber technology, Cyber security and Cyber warfare
[This article belongs to Journal Of Network security (jons)]
Muhammad Aftab Khalid, Ahthasham Sajid, Fariha Shoukat. Impact of Cyber Security in Modern Warfare. Journal Of Network security. 2024; 12(03):-.
Muhammad Aftab Khalid, Ahthasham Sajid, Fariha Shoukat. Impact of Cyber Security in Modern Warfare. Journal Of Network security. 2024; 12(03):-. Available from: https://journals.stmjournals.com/jons/article=2024/view=0
References
document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_ref_110326’);});Edit
- Ogun MN. Terrorist use of internet: possible suggestions to prevent the usage for terrorist purposes. Journal of Applied Security Research. 2012 Apr 1;7(2):203-17.
- Khan S, Butt KM. Cyber technology, radicalization and Terrorism in Pakistan. Journal of Indian Studies. 2017 Dec 31;3(02):119-28.
- Meleagrou-Hitchens A, Kaderbhai N. Research Perspectives on Online Radicalisation a Literature Review, 2006-2016. 2017. Available from: https://icsr.info/wp-content/uploads/2017/05/ICSR-Paper_Research-Perspectives-on-Online-Radicalisation-A-Literature-Review-2006-2016.pdf
- Whittaker J. Online Radicalisation What we know. 2022. Available from: https://home-affairs.ec.europa.eu/system/files/2023-11/RAN-online-radicalisation_en.pdf
- Khan RA. Meta-analysis of cyber dominance in modern warfare: Attacks and mitigation strategies. Turkish Journal of Computer and Mathematics Education (TURCOMAT). 2023 Jul 8;14(03):1051-61.
- Altmann J, Vidal F, Capurro R, Britz J, Hausmanninger T, Nagenborg M, Nakada M, Weil F. Cyber Warfare. International Review of Information Ethics. 2013;20:12.
- Basholli F. Cyber warfare, a new aspect of modern warfare. InVI International Scientific Conference on Security „CONFSEC 2022 Dec (pp. 52-54).
- Ashwini Sheth, Mr. Sachin Bhosale, Mr. Farish Kurupkar. Research Paper on Cyber Security. “Emerging Advancement and Challenges in Science, Technology and Management ” 23rd & 24th April 2021. 246 Contemporary Research in India. Special Issue; April 2021.
- Khan S, Butt KM. Cyber technology, radicalization and Terrorism in Pakistan. Journal of Indian Studies. 2017 Dec 31;3(02):119-28.
- Katyal NK. Criminal law in cyberspace. University of Pennsylvania Law Review. 2001 Apr 1;149(4):1003-114.
- Weimann G. Cyber-fatwas and terrorism. Studies in Conflict & Terrorism. 2011 Oct 1;34(10):765-81.

Journal Of Network security
| Volume | 12 |
| Issue | 03 |
| Received | 12/09/2024 |
| Accepted | 23/09/2024 |
| Published | 29/10/2024 |
function myFunction2() {
var x = document.getElementById(“browsefigure”);
if (x.style.display === “block”) {
x.style.display = “none”;
}
else { x.style.display = “Block”; }
}
document.querySelector(“.prevBtn”).addEventListener(“click”, () => {
changeSlides(-1);
});
document.querySelector(“.nextBtn”).addEventListener(“click”, () => {
changeSlides(1);
});
var slideIndex = 1;
showSlides(slideIndex);
function changeSlides(n) {
showSlides((slideIndex += n));
}
function currentSlide(n) {
showSlides((slideIndex = n));
}
function showSlides(n) {
var i;
var slides = document.getElementsByClassName(“Slide”);
var dots = document.getElementsByClassName(“Navdot”);
if (n > slides.length) { slideIndex = 1; }
if (n (item.style.display = “none”));
Array.from(dots).forEach(
item => (item.className = item.className.replace(” selected”, “”))
);
slides[slideIndex – 1].style.display = “block”;
dots[slideIndex – 1].className += ” selected”;
}
