Anàlisi de tipus moderns de ciberterrorisme i mètodes per a contrarestar-los
Article Sidebar
Citacions a Google Acadèmic
Main Article Content
Davant del desenvolupament digital accelerat, la creixent dependència de les tecnologies de la informació i, al mateix temps, la creixent amenaça del ciberterrorisme, aquest estudi té com a objectiu desenvolupar estratègies eficients per a contrarestar les ciberamenaçes contemporànies. S’han emprat mètodes com ara l’experimentació, la comparació, l’anàlisi i la síntesi per a aconseguir aquest propòsit. Els resultats principals de l’estudi abasten una àmplia descripció general i anàlisi de les formes modernes de ciberterrorisme i les seves característiques clau. Com a part de l’estudi, s’implementa un pla per a combatre el ciberterrorisme, incorporant diverses estratègies i mètodes per a prevenir les amenaces cibernètiques. S’usa codi Python per a rastrejar el trànsit de xarxa, analitzar la transmissió de dades i bloquejar nodes que causin danys, la qual cosa ajuda a detectar i prevenir possibles ciberatacs. Es desenvolupa un esquema estructural per a sistematitzar el procés de contrarestar els ciberatacs que conté un pla d’acció detallat. El pla comença amb la detecció de possibles atacs i acaba amb l’anàlisi de l’efectivitat de les mesures i la planificació dels passos futurs. A més, es proporcionen exemples reals de ciberatacs globals i s’examinen altres estudis sobre aquest tema. El valor pràctic d’aquest estudi resideix a proporcionar recomanacions concretes i maneres de millorar la ciberseguretat tant en l’àmbit governamental com corporatiu.
Article Details
Aquesta obra està sota una llicència internacional Creative Commons Reconeixement-SenseObraDerivada 3.0.
(c) Kakimzhan Bishmanov, Zarina Muratzhan, Zhanat Dilbarkhanova, Viktoriya Lyutsik, 2024
Drets d'autor
Els continguts publicats a IDP estan subjectes a una llicència de Reconeixement-Sense obres derivades 3.0 Espanya de Creative Commons, el text complet de la qual es pot consultar a http://creativecommons.org/licenses/by-nd/3.0/es/deed.ca. Així, doncs, se'n permet la còpia, distribució i comunicació pública sempre que se citi l'autor del text, la revista i la institució que els publiquen (IDP. Revista d'Internet, Dret i Política i UOC), tal com consta en la citació recomanada inclosa a cada article. No se'n poden fer obres derivades.
És responsabilitat dels autors obtenir els permisos necessaris de les imatges que estiguin subjectes a copyright.
Cessió de drets de propietat intel·lectual
L’autor cedeix sense exclusiva als editors de la revista els drets d’explotació (reproducció, distribució, comunicació pública i transformació) per a explotar i comercialitzar l’obra, sencera o en part, en tots els formats i modalitats d’explotació presents o futurs, en tots els idiomes, per tot el període de vida de l’obra i per tot el món.
L'autor ha de declarar que és l’autor original de l’obra. Els editors queden, per tant, exonerats de qualsevol obligació o responsabilitat per qualsevol acció legal que es pugui suscitar derivada de l’obra dipositada per la vulneració de drets de tercers, siguin de propietat intel·lectual o industrial, de secret comercial o qualsevol altre.
Kakimzhan Bishmanov, Universitat Nacional Al-Farabi Kazakh
Doctorat en Dret, professor en el Departament d’Estudis Culturals i Religiosos, Universitat Nacional Al-Farabi Kazakh, Almati, República del Kazakhstan. Els seus interessos científics inclouen la ciberseguretat, les formes modernes de ciberatacs i les contramesures eficaces.
Zarina Muratzhan, Acadèmia M. Esbolatov d’Almati del Ministeri d’Assumptes Interns de la República del Kazakhsta
Investigadora en l’Acadèmia M. Esbolatov d’ Almati del Ministeri d’Assumptes Interns de la República del Kazakhstan, Almati, República del Kazakhstan. Els seus interessos de recerca inclouen la seguretat de la informació i les estratègies eficients per a contrarestar les ciberamenaçes contemporànies.
Zhanat Dilbarkhanova, Acadèmia M. Esbolatov d’ Almati del Ministeri d’Assumptes Interns de la República del Kazakhstan
Doctora en Dret, subdirectora de l’Acadèmia d’Almati M. Esbolatov del Ministeri d’Assumptes Interns de la República del Kazakhstan, Almati, República del Kazakhstan. Els seus interessos científics inclouen millorar la ciberseguretat, la protecció contra atacs informàtics i la implementació de programari d’estratègies de ciberseguretat.
Viktoriya Lyutsik, Universitat de Turan
Doctorada en Dret, professora adjunta del Departament de Jurisprudència i Dret Internacional de la Universitat de Turan, Almati, República del Kazakhstan. Els seus interessos científics inclouen la seguretat, les amenaces digitals, la lluita contra les amenaces cibernètiques i la lluita contra els ciberatacs globals.
AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314
AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf
ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236
AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09
ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221
AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767
BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50
BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887
BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24
CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376
CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652
CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM
GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8
HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism
KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605
KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.
KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana
LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA
MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685
METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.
MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9
MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123
OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29
PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4
RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032
SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29
SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)
SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414
SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44
TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30
VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411
AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314
AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf
ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236
AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09
ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221
AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767
BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50
BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887
BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24
CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376
CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652
CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM
GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8
HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism
KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605
KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.
KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana
LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA
MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685
METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.
MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9
MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123
OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29
PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4
RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032
SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29
SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)
SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414
SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44
TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30
VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411
AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314
AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf
ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236
AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09
ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221
AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767
BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50
BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887
BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24
CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376
CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652
CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM
GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8
HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism
KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605
KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.
KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana
LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA
MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685
METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.
MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9
MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123
OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29
PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4
RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032
SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29
SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)
SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414
SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44
TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30
VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411
AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314
AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf
ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236
AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09
ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221
AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767
BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50
BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887
BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24
CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376
CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652
CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM
GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8
HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism
KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605
KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.
KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana
LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA
MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685
METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.
MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9
MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123
OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29
PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4
RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032
SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29
SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)
SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414
SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44
TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30
VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411