Analysis of modern types of cyberterrorism and methods of countering them

Main Article Content

Kakimzhan Bishmanov
Zarina Muratzhan
Zhanat Dilbarkhanova
Viktoriya Lyutsik

In light of the accelerated digital development, the heightened reliance on information technologies, and, at the same time, the growing threat of cyberterrorism, this study aims to develop efficient strategies to counter contemporary cyber threats. Methods such as experimentation, comparison, analysis, and synthesis were employed to achieve this purpose. The study’s main results encompass a broad overview and analysis of modern forms of cyberterrorism and their key characteristics. As part of the study, a plan to combat cyberterrorism is implemented, incorporating diverse strategies and methods for preventing cyber threats. Python code is used to track network traffic, analyse data transmission, and block nodes causing harm, aiding in detecting and preventing potential cyberattacks. A structural scheme is developed to systematize the process of countering cyberattacks, containing a detailed action plan. The scheme starts with detecting potential attacks and ends with analysing the measures’ effectiveness and planning for future steps. In addition, real-world examples of global cyberattacks are provided, and other studies on this issue are examined. The practical value of this study lies in providing concrete recommendations and ways to enhance cybersecurity at both governmental and corporate levels.

Keywords
cyber threats, cybersecurity, information protection, information technology

Article Details

How to Cite
Bishmanov, Kakimzhan et al. “Analysis of modern types of cyberterrorism and methods of countering them”. IDP. Internet, Law and Politics E-Journal, no. 41, doi:10.7238/idp.v0i41.428542.
Author Biographies

Kakimzhan Bishmanov, Al-Farabi Kazakh National University

PhD in Law, Professor at the Department of Cultural and Religious Studies, Al-Farabi Kazakh National University, Almaty, Republic of Kazakhstan. His scientific interests include cybersecurity, modern forms of cyberattacks and effective countermeasures.

Zarina Muratzhan, M. Esbolatov Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhsta

Researcher at the M. Esbolatov Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhstan, Almaty, Republic of Kazakhstan. Her research interests include information security and efficient strategies for countering contemporary cyber threats.

Zhanat Dilbarkhanova, M. Esbolatov Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhstan

Full Doctor in Law, Deputy Chief of the M. Esbolatov Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhstan, Almaty, Republic of Kazakhstan. Her scientific interests include improving cybersecurity, computer attack protection and software implementation of cybersecurity strategies.

Viktoriya Lyutsik, Turan University

PhD in Law, Associate Professor at the Department of Jurisprudence and International Law, Turan University, Almaty, Republic of Kazakhstan. Her scientific interests include security, digital threats, combating cyber threats and addressing global cyberattacks.

References

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411

AKHMETOV, B.; AIDARKUL, M. (2023). “Modeling of cyber threats in information networks of remote service systems”. The Bulletin of Academy of Logistics and Transport, vol. 126, no. 3, pp. 306-314. DOI: https://doi.org/10.52167/1609-1817-2023-126-3-306-314

AKYLBAYEVA, I. M.; MALGARAYEVA, Z. B.; KUSSAINOVA, Zh. D.; AMANZHOLULY, S. K.; UMIRZAKOVA, L. A.; KALENOVA, T. S.; ZHARKENOVA, A. M.; TLEBALDIYEVA, M. D. (2014). “Resources of terrorism spread and its globalization”. Life Science Journal, vol. 11, no. 1s, pp. 202-206 [online]. Available at: https://www.lifesciencesite.com/lsj/life1101s/036_22847life1101s2014_202_206.pdf

ALIMSEITOVA, Zh.; BEKETOVA, G. (2022). “Analysis of neural network models and methods for detecting and recognition of network attacks”. The Bulletin of Academy of Logistics and Transport, vol. 122, no. 3, pp. 227-236. DOI: https://doi.org/10.52167/1609-1817-2022-122-3-227-236

AMIROVA, A.; TOKHMETOV, A. (2022). “Combined model of threat detection in industrial internet of things”. Bulletin of the Abai Kazakh National Pedagogical University, the Series of “Physical and Mathematical Sciences”, vol. 77, no. 1, pp. 70-77. DOI: https://doi.org/10.51889/2022-1.1728-7901.09

ARSTANBEKOV, M.; SEIDAKMATOV, N.; TATENOV, M.; KANYBEKOVA, B.; KAKESHOV, B. (2024). “Victimological aspects of countering internet crime: State and local government practices”. Social and Legal Studios, vol. 7, no. 1, pp. 221-234. DOI: https://doi.org/10.32518/sals1.2024.221

AZZAHIDI, I.; JUNIANSE, F.M. (2023). “Analysis of Indonesian and European Union (EU) relationship strategy overcoming cyber terrorism”. MANU Journal of the Centre for Science and Language Upgrading, vol. 34, no. 2, pp. 1-16. DOI: https://doi.org/10.51200/manu.v34i2.4767

BORKO, T.; VILKS, A. (2023). “Consequences and threats of international terrorism for Ukraine”. Foreign Affairs, vol. 33, no. 3, pp. 43-50. DOI: https://doi.org/10.46493/2663-2675.33(3).2023.43-50

BROEDERS, D.; CRISTIANO, F.; WEGGEMANS, D. (2021). “Too close for comfort: Cyber terrorism and information security across national policies and international diplomacy”. Studies in Conflict and Terrorism, vol. 46, no. 12, pp. 2426-2453. DOI: https://doi.org/10.1080/1057610X.2021.1928887

BUTLER, G.; MONTASARI, R. (2023). “The impact of the Internet on terrorism and violent extremism”. In: Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications, pp. 427-436. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-20160-8_24

CANTIKA, S.; UMNIYAH, A. (2023). “Analysis of the Australian government’s security strategy in countering the potential threat of terrorism groups through cyber terrorism instruments”. Insignia Journal of International Relations, vol. 10, no. 2, pp. 214-227. DOI: https://doi.org/10.20884/1.ins.2023.10.2.9376

CERT-UA (2023). Massive cyberattack UAC-0050 using RemcosRAT/MeduzaStealer against Ukraine and Poland (CERT-UA#8218) [online]. Available at: https://cert.gov.ua/article/6276652

CONSTANTIN, D.M. (2021). “Cyber intelligence – Method of countering terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/370520729_CYBER_INTELLIGENCE_-METHOD_OF_COUNTERING_TERRORISM

GONZALES, D. (2022). “It’s getting harder to do: Countering terrorist use of the Internet”. In: Terrorism and Transatlantic Relations, pp. 165-190. Cham: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-3-030-83347-3_8

HAIDER, A. (2023). “Cyber terrorism”. Researchgate [online]. Available at: https://www.researchgate.net/publication/375895130_alarhab_alsybrany_Cyber_Terrorism

KALMURZAEV, B. A.; OZKAN, O.; RAZDYKOVA, G. M.; BEKBOSYNOV, E. T. (2021). “Comparative legal analysis of national legislation on countering religious extremism with the national legislation of foreign countries”. Bulletin of the Toraighyrov University, no. 4, pp. 9-23. DOI: http://doi.org/10.48081/LOOG2605

KANYBEKOVA, B.; ARSTANBEKOV, M.; KAKESHOV, B.; ERDOLATOV, C. S.; ARTYKBAEV, I. (2023). “Criminological aspects of the behaviour of victims of cyberattacks: Case analysis of hacking state organisations ensuring national security”. Pakistan Journal of Criminology, vol. 15, no. 4, pp. 175-192.

KIM, S. (2024). “Chinese hackers controlled critical IT infrastructure in Kazakhstan”. Factcheck [online]. Available at: https://factcheck.kz/novosti/kitayskie-hakery-kontrolirovali-kriticheskie-obekty-it-infrastruktury-kazahstana

LEŠTANIN, B.; NIKAC, Z. (2022). “Fight against cyber crime in Republic of Serbia”. In: International Crime and Punishment Film Festival “Justice in the Virtual World”, pp. 65-78 [online]. Available at: https://www.academia.edu/42755559/FIGHT_AGAINST_CYBER_CRIME_IN_REPUBLIC_OF_SERBIA

MAHBOOB, S. M.; ABBAS, S. S.; SHAHEEN, I. A. (2023). “Adapting to cybersecurity challenges: Assessing the effectiveness of international law against cyber terrorism”. Journal of Social Research Development, vol. 4, no. 4, pp. 669-685. DOI: https://doi.org/10.53664/JSRD/04-04-2023-02-669-685

METELSKYI, I.; KRAVCHUK, M. (2023). “Features of cybercrime and its prevalence in Ukraine”. Law, Policy and Security, vol. 1, no. 1, pp. 18-25.

MONTASARI, R. (2024). “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”. In: Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution, pp. 159-197. Cham: Springer. DOI: https://doi.org/10.1007/978-3-031-50454-9_9

MOVCHAN, A.; SHLIAKHOVSKYI, O.; KOZII, V.; FEDCHAK, I. (2023). “Investigating cryptocurrency financing crimes terrorism and armed aggression”. Social and Legal Studios, vol. 6, no. 4, pp. 123-131. DOI: https://doi.org/10.32518/sals4.2023.123

OSPANOVA, A.; ZHARKIMBEKOVA, А.; KUSEPOVA, L.; TOKKULIYEVA, A.; MANMURYN, M. (2021). “Cloud service for protection and monitoring of computer networks”. Engineering Journal of Satbayev University, vol. 143, no. 3, pp. 222-229. DOI: https://doi.org/10.51301/vest.su.2021.i3.29

PRASAD, S.; KUMAR, A. (2022). “Cyber terrorism: A growing threat to India’s cyber security”. In: Nontraditional Security Concerns in India, pp. 53-73. Singapore: Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-16-3735-3_4

RENFRO, E. (2022). “Messengers of death: Cyber and the root structure of terror”. In: Research Anthology on Modern Violence and Its Impact on Society, pp. 582-599. Hershey: IGI Global. DOI: https://doi.org/10.4018/978-1-6684-7464-8.ch032

SALIH, A. J.; AL ALAZZAM, F. A. (2023). “A competent approach to the training of lawyers in “cyberterrorism””. Pedagogy and Education Management Review, no. 1, pp. 29-43. DOI: https://doi.org/10.36690/2733-2039-2023-1-29

SANGER, D.; KRAUSS, C.; PERLROTH, N. (2021). “Cyberattack forces a shutdown of a top U.S. pipeline”. The New York Times [online]. Available at: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

SHOPINA, I.; KHOMIAKOV, D.; KHRYSTYNCHENKO, N.; ZHUKOV, S.; SHPENOV, D. (2020). “Cybersecurity: Legal and organizational support in leading countries, NATO and EU standards”. Journal of Security and Sustainability Issues, vol. 9, no. 3, pp. 977-992. DOI: https://doi.org/10.9770/jssi.2020.9.3(22)

SIDDHA, A.; BENARRIVO, R. (2023). “Counter cyber terrorism governance in Indonesia”. Khazanah Sosial, vol. 5, no. 2, pp. 359-367. DOI: https://doi.org/10.15575/ks.v5i2.26414

SOPILKO, I.; RAPATSKA, L. (2023). “Social-legal foundations of information security of the state, society and individual in Ukraine”. Scientific Journal of the National Academy of Internal Affairs, vol. 28, no. 1, pp. 44-54. DOI: https://doi.org/10.56215/naia-herald/1.2023.44

TYMOSHENKO, V. (2022). “Terrorism as a threat to human rights”. Law Journal of the National Academy of Internal Affairs, vol. 12, no. 3, pp. 30-38. DOI: https://doi.org/10.56215/04221203.30

VILKS, A.; KIPANE, A.; KUDEIKINA, I.; PALKOVA, K.; GRASIS, J. (2022). “Criminological aspects of current cyber security”. Revista de Direito, Estado e Telecomunicacoes, vol. 14, no. 2, pp. 94-108. DOI: https://doi.org/10.26512/lstr.v14i2.41411