Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • Subscribe
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Trends
  • Supplier Listings
  • Advertise
  • Subscribe

Cyberterrorism Could Get Personal, Researchers Suggest

By David Bradley | January 12, 2017

Cyber terrorism is a controversial term. In considering terrorism, the popular image is of hijacked aeroplanes, buildings and lives destroyed by bombs, multiple shootings and other large-scale life-threatening incidents. It would be easy to marginalise cyberterrorism as nothing more important as a bit of hacking, a few leaked emails and passwords, a website blocked. Unfortunately, one must consider the scenario in which a cyberterrorist takes control of important infrastructure, transport systems, power grids, and defence installations. Where a network of terrorists might organise a large-scale terror attack involving conventional weapons, the cyberterrorist might take control of or even destroy infrastructure on which millions of lives depend.

Writing in the International Journal of Business Continuity and Risk Management, Nicholas Ayres, Leandros Maglaras, Helge Janicke, Richard Smith and Ying He of the School of Computer Science and Informatics, at De Montfort University, Leicester, UK, explain that in cyberterrorism the computer, the digital world, becomes both weapon and target, and the consequences of malicious use in such a context could have global consequences. They point out that the main focus of defence and intelligence agencies when it comes to the diffuse term cyberterrorism is currently critical national infrastructure. However, a very large proportion of the global population is now online. With simple tools, our personal computers and communications devices could be an easier and more tempting target for the cyberterrorist.

The cyberterrorist might, for instance, permanently disable our connectivity at the individual level and cause harm perhaps by blocking access to utilities, health, and emergency services. They might physically damage our homes and other property by taking control of the growing number of Internet of things (IoT) devices used to control heating, refrigeration, lighting, security and other domestic systems, and increasingly our vehicles. Moreover, the concept of distributed denial of service attacks (DDOS) carried out by so-called “zombie” computers operating as part of a botnet have already been used widely in hacking well-known corporate databases. It may well be only a matter of time before a botnet is used to take control or manipulate with malicious intent critical systems in the domestic environment as well as in industry, commerce and defence.

“The postmodern cyberterrorist can deploy a digital weapon such as a virus that can be programmed to ‘explode’ or activate at a specified time or if a specific condition is met,” the team suggests. “A whole new arsenal of digital armaments in order to attack a target that is anywhere in the world and equally can be deployed from anywhere,” the team adds. Given that the primary motive of the terrorist is to instil fear in people, this might be possible on a global level with the threat and demonstration of a sufficiently destructive computer virus that interferes at a critical level in terms of safety, food and water, health and other critical aspects of our daily lives.

In the digital age we have a whole lot more to fear than fear itself, Franklin D…

You Might Also Like


Filed Under: Industry regulations + certifications

 

LEARNING CENTER

Design World Learning Center
“dw
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for Design Engineering Professionals.
Motor University

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Widening the scope for machine tool designers with FORTiS™ enclosed encoder
  • Sustainability, Innovation and Safety, Central to Our Approach
  • Why off-highway is the sweet spot for AC electrification technology
  • Looking to 2025: Past Success Guides Future Achievements
  • North American Companies Seek Stronger Ties with Italian OEMs
  • Adapt and Evolve
View More >>
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Control Engineering
  • Consulting-Specifying Engineer
  • Plant Engineering
  • Engineering White Papers
  • Leap Awards

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • Subscribe
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Trends
  • Supplier Listings
  • Advertise
  • Subscribe
We use cookies to personalize content and ads, to provide social media features, and to analyze our traffic. We share information about your use of our site with our social media, advertising, and analytics partners who may combine it with other information you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website.