Use of Cyber Space by Terrorist Organizations

Journal Title: INTERNATIONAL JOURNAL FOR ELECTRONIC CRIME INVESTIGATION - Year 2018, Vol 2, Issue 1

Abstract

Prevention of Electronic Crime Act 2016 of Pakistan, defines and include cyber terrorism as a cyber-crime. Due to its anonymity cyber space is a popular tool used by terrorists. Terrorists use cyber space to launch their propaganda, recruit new workforce, radicalize target groups, raise financing, train the new recruits or upgrade the skills of existing workforce, raise funding for their operations, establish communication infrastructure to communicate within and outside the organization and execute their operations. This article discusses the various ways cyber space is used by the terrorist organizations to execute their plans.

Authors and Affiliations

KAUKAB JAMAL ZUBERI

Keywords

Related Articles

DNA Fingerprints Facial Prints and Other Digital Forensics as Evidence in Criminal Investigation and Court Proceedings

The purpose of this paper is to focus on the legitimacy and importance of digital evidence such as fingerprints, DNA, polygraph, auto-radiography, and facial-prints and their admissibility in investigations and court pro...

Use of Cyber Space by Terrorist Organizations

Prevention of Electronic Crime Act 2016 of Pakistan, defines and include cyber terrorism as a cyber-crime. Due to its anonymity cyber space is a popular tool used by terrorists. Terrorists use cyber space to launch their...

User Trust on Online Social Network on the basis of Security and privacy

Online social networks have become a popular medium of sharing information and also major source for connecting the people on a network. As we know that the threats related to online social network is affecting people to...

A Survey on Attacks and Detection Mechanisms in VANET

Vehicular ad hoc network (VANET) has grown to be foremost up and coming talented and rapidly uprising network or matrix in modern vehicles and this matrix is termed as mobile ad hoc network (MANET). This matrix consists...

Enterprise Security of Wi-Fi Networks using Simulation

Wireless network setting is developing into the market, and it is the major way of accessing the internet. Design and security of these networks for an organization need to be considered to ensure mobility and access to...

Download PDF file
  • EP ID EP288191
  • DOI -
  • Views 137
  • Downloads 0

How To Cite

KAUKAB JAMAL ZUBERI (2018). Use of Cyber Space by Terrorist Organizations. INTERNATIONAL JOURNAL FOR ELECTRONIC CRIME INVESTIGATION, 2(1), 11-16. https://europub.co.uk/articles/-A-288191