| 000 | 01899nab a22001817a 4500 | ||
|---|---|---|---|
| 008 | 120229t xxu||||| |||| 00| 0 eng d | ||
| 040 |
_aES-MaBCA _cES-MaBCA |
||
| 100 |
_95112 _aAdelkhah, Nima |
||
| 245 |
_aIran and Its Cyber-Terrorism Strategies _h[Recurso electrónico] PDF |
||
| 300 | _aRecurso online | ||
| 520 | _aU.S. government charges levied against seven Iranian hackers in March over cyber-attacks against 46 financial institutions and the infiltration of the computer control system of a New York dam has renewed concerns about Iran’s engagement in cyber-terrorism against the United States (Al Jazeera, March 25). Those attacks date back to 2013, but there have been a range of cyber-attacks originating from Iran, of varying seriousness, targeting industrial facilities, bank websites and the personal websites of American, Israeli, and Arab officials (Gulf News, May 14, 2013; Al-Jazeera, December 18, 2009). In one of the most high-profile attacks, the so-called Iranian Cyber Army targeted Twitter in 2009, months after the microblogging site was used by anti-government activists to foment street protests following that year’s disputed presidential election (The Jerusalem Post, February 6, 2010). Since 2009—and particularly in response to Stuxnet in 2011—Iran’s cyber-campaigns have combined a mixture of defensive and offensive strategies, and have been conducted either directly or through proxies assigned specific tasks by state actors. | ||
| 650 | 0 |
_91708 _aDelitos informáticos |
|
| 650 | 0 |
_93228 _aEstrategias de seguridad |
|
| 651 | 0 |
_91262 _aIrán |
|
| 773 | 0 |
_6http://www.jamestown.org/uploads/media/Terrorism_Monitor_Volume_XIV_Issue_10.pdf _aTerrorism Monitor _g. -- Vol. XIV Issue 10 (May 2016) p. 6-7 _iEn : _tTerrorism Monitor _w4338 |
|
| 856 | 4 |
_uhttp://www.jamestown.org/uploads/media/Terrorism_Monitor_Volume_XIV_Issue_10.pdf _qPDF |
|
| 942 |
_2udc _cAN |
||
| 999 |
_c18211 _d18214 |
||