Cyberterrorism – The New Face of Terrorism
Abstract
The authors present the legal regulation of cyber-terrorism. They classify the perpetrators, as the commonly used term hacker is too wide to differentiate between skilled cyber criminals. Finally, they discuss the tools used by cyberterrorists; the list of tools is incomplete because the IT area is rapidly evolving.
Keywords:
Cyberterrorism
Terrorism
cyberterrorists tools
How to Cite
Pataki, M., & Kelemen, R. (2014). Cyberterrorism – The New Face of Terrorism. Hungarian Law Enforcement, 14(5), 103–116. Retrieved from https://folyoirat.ludovika.hu/index.php/magyrend/article/view/3886
Downloads
Download data is not yet available.