An International Study on the Risk of Cyber Terrorism
Suhannia Ponnusamy1, Geetha A. Rubasundram2

1Suhannia Ponnusamy, Asia Pacific University of Technology and Innovation, Malaysia.
2Geetha A. Rubasundram, Asia Pacific University of Technology and Innovation, Malaysia.
Manuscript received on 05 February 2019 | Revised Manuscript received on 11 February 2019 | Manuscript Published on 19 February 2019 | PP: 159-163 | Volume-7 Issue-5S January 2019 | Retrieval Number: ES2141017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Cyberterrorism has been a risk since the advent of the Internet. Technology has developed at a rapid pace, and likewise, the risk and impact of cyberterrorism. It is pertinent that secure and updated mechanisms are in place to mitigate the risk of cyberterrorism, with international cooperation and collaboration to further enhance investigation and information gathering. This paper discusses mechanisms such as security applications, security policies, comprehending education programs, international co-operation, monitoring and Artificial Intelligence (AI) and monitoring, using and disrupting approach (M.U.D). Implementations of all the mechanisms allows computer network and systems to be less vulnerable and manages the risk of cyberterrorism because each mechanisms possess separate functions for combatting cyberterrorism. As a result, the objectives and hypothesis for this research evidences a positive correlation between the mechanisms recognized and the perceived risk of cyberterrorism. Various initiatives has been introduced by respective bodies from all over the world in order to ensure that the threat of cyberterrorism is controllable. However, the threat of cyberterrorism continuous to increase due to the constant development of Internet-based platforms. Thus, law enforcements, policies, practices and necessary measures should continue developing contemporarily to the development of computer technology.
Keywords: Cyber Terrorism, Artificial Intelligence (AI), Monitoring, Using and Disrupting (M.U.D).
Scope of the Article: Large-Scale Cyber Systems