Anàlisi de tipus moderns de ciberterrorisme i mètodes per a contrarestar-los

Main Article Content

Kakimzhan Bishmanov
Zarina Muratzhan
Zhanat Dilbarkhanova
Viktoriya Lyutsik

Davant del desenvolupament digital accelerat, la creixent dependència de les tecnologies de la informació i, al mateix temps, la creixent amenaça del ciberterrorisme, aquest estudi té com a objectiu desenvolupar estratègies eficients per a contrarestar les ciberamenaçes contemporànies. S’han emprat mètodes com ara l’experimentació, la comparació, l’anàlisi i la síntesi per a aconseguir aquest propòsit. Els resultats principals de l’estudi abasten una àmplia descripció general i anàlisi de les formes modernes de ciberterrorisme i les seves característiques clau. Com a part de l’estudi, s’implementa un pla per a combatre el ciberterrorisme, incorporant diverses estratègies i mètodes per a prevenir les amenaces cibernètiques. S’usa codi Python per a rastrejar el trànsit de xarxa, analitzar la transmissió de dades i bloquejar nodes que causin danys, la qual cosa ajuda a detectar i prevenir possibles ciberatacs. Es desenvolupa un esquema estructural per a sistematitzar el procés de contrarestar els ciberatacs que conté un pla d’acció detallat. El pla comença amb la detecció de possibles atacs i acaba amb l’anàlisi de l’efectivitat de les mesures i la planificació dels passos futurs. A més, es proporcionen exemples reals de ciberatacs globals i s’examinen altres estudis sobre aquest tema. El valor pràctic d’aquest estudi resideix a proporcionar recomanacions concretes i maneres de millorar la ciberseguretat tant en l’àmbit governamental com corporatiu.

Paraules clau
ciberamenaçes, ciberseguretat, protecció de la informació, tecnologia de la informació

Article Details

Com citar
Bishmanov, Kakimzhan et al. “Anàlisi de tipus moderns de ciberterrorisme i mètodes per a contrarestar-los”. IDP. Revista d’Internet, Dret i Política, no. 41, doi:10.7238/idp.v0i41.428542.
Biografies de l'autor/a

Kakimzhan Bishmanov, Universitat Nacional Al-Farabi Kazakh

Doctorat en Dret, professor en el Departament d’Estudis Culturals i Religiosos, Universitat Nacional Al-Farabi Kazakh, Almati, República del Kazakhstan. Els seus interessos científics inclouen la ciberseguretat, les formes modernes de ciberatacs i les contramesures eficaces.

Zarina Muratzhan, Acadèmia M. Esbolatov d’Almati del Ministeri d’Assumptes Interns de la República del Kazakhsta

Investigadora en l’Acadèmia M. Esbolatov d’ Almati del Ministeri d’Assumptes Interns de la República del Kazakhstan, Almati, República del Kazakhstan. Els seus interessos de recerca inclouen la seguretat de la informació i les estratègies eficients per a contrarestar les ciberamenaçes contemporànies.

Zhanat Dilbarkhanova, Acadèmia M. Esbolatov d’ Almati del Ministeri d’Assumptes Interns de la República del Kazakhstan

Doctora en Dret, subdirectora de l’Acadèmia d’Almati M. Esbolatov del Ministeri d’Assumptes Interns de la República del Kazakhstan, Almati, República del Kazakhstan. Els seus interessos científics inclouen millorar la ciberseguretat, la protecció contra atacs informàtics i la implementació de programari d’estratègies de ciberseguretat.

Viktoriya Lyutsik, Universitat de Turan

Doctorada en Dret, professora adjunta del Departament de Jurisprudència i Dret Internacional de la Universitat de Turan, Almati, República del Kazakhstan. Els seus interessos científics inclouen la seguretat, les amenaces digitals, la lluita contra les amenaces cibernètiques i la lluita contra els ciberatacs globals.

Referències

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411