000 01899nab a22001817a 4500
008 120229t xxu||||| |||| 00| 0 eng d
040 _aES-MaBCA
_cES-MaBCA
100 _95112
_aAdelkhah, Nima
245 _aIran and Its Cyber-Terrorism Strategies
_h[Recurso electrónico] PDF
300 _aRecurso online
520 _aU.S. government charges levied against seven Iranian hackers in March over cyber-attacks against 46 financial institutions and the infiltration of the computer control system of a New York dam has renewed concerns about Iran’s engagement in cyber-terrorism against the United States (Al Jazeera, March 25). Those attacks date back to 2013, but there have been a range of cyber-attacks originating from Iran, of varying seriousness, targeting industrial facilities, bank websites and the personal websites of American, Israeli, and Arab officials (Gulf News, May 14, 2013; Al-Jazeera, December 18, 2009). In one of the most high-profile attacks, the so-called Iranian Cyber Army targeted Twitter in 2009, months after the microblogging site was used by anti-government activists to foment street protests following that year’s disputed presidential election (The Jerusalem Post, February 6, 2010). Since 2009—and particularly in response to Stuxnet in 2011—Iran’s cyber-campaigns have combined a mixture of defensive and offensive strategies, and have been conducted either directly or through proxies assigned specific tasks by state actors.
650 0 _91708
_aDelitos informáticos
650 0 _93228
_aEstrategias de seguridad
651 0 _91262
_aIrán
773 0 _6http://www.jamestown.org/uploads/media/Terrorism_Monitor_Volume_XIV_Issue_10.pdf
_aTerrorism Monitor
_g. -- Vol. XIV Issue 10 (May 2016) p. 6-7
_iEn :
_tTerrorism Monitor
_w4338
856 4 _uhttp://www.jamestown.org/uploads/media/Terrorism_Monitor_Volume_XIV_Issue_10.pdf
_qPDF
942 _2udc
_cAN
999 _c18211
_d18214