Vous êtes sur la page 1sur 6

Page 0ne (1)

------------------

[EXAMPLE TITLE PAGE]

- ------------------

INFORMATION AGE TERRORISM: TOWARD CYBERTERROR


By Fernando Estrada

A Thesis Submitted to Pamantasan Ng Lungsod Ng Muntinlupa, Poblacion, Muntinlupa in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Computer Studies

April, 2020, Poblacion, Muntinlupa Copyright Fernando Estrada

Approved:

Prof. Nonoy T. Arroyo Supervisor Dr. Vhong Lee Examiner Prof. Cedric Navarro Reader March 3, 2020

Approved:

Approved :

Date:

Page Two (2)

[EXAMPLE ABSTRACT PAGE]

ABSTRACT

INFORMATION AGE TERRORISM: TOWARD CYBERTERROR


by Fernando Estrada

The growing ubiquity of computers and their associated networks is propelling the worked into the information age. Computers may revolutionize terrorism in the same manner that they have revolutionized everyday life. Terrorism in the information age will consist of conventional terrorism, in which classic weapons (explosives, guns, etc.) will be used to destroy property and kill victims in the physical world; technoterrorism, in which classic weapons will be used to destroy infrastructure targets and cause a disruption in cyberspace; and cyberterrorism, where new weapons (malicious software, electromagnetic and microwave weapons) will operate to destroy data in cyberspace to cause a disruption in the physical world. The advent of cyberterrorism may force a shift in the definition of terrorism to include both disruption and violence in cyberspace in the same manner as physical destruction and violence. Through the use of new technology, terrorist groups may have fewer members, yet still have a global reach, The increasing power of computers may lower the threshold of state sponsorship to a point where poor states can become sponsors and rich states are no longer necessary for terrorist groups to carry out complex attacks. This thesis explores the shift toward information warfare across the conflict spectrum and its implications for terrorism. By examining the similarities and differences with past conventional terrorism, policymakers will be able to place information age terrorism into a known framework and begin to address the problem.
April 20, 2020.

Page Three (3)

[EXAMPLE SIGNATURE PAGE]

INFORMATION AGE TERRORISM: TOWARD CYBERTERROR


By Fernando Estrada

A Thesis Submitted to Pamantasan Ng Lungsod Ng Muntinlupa, Poblacion, Muntinlupa in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Computer Studies

April, 2020, Poblacion, Muntinlupa Copyright Fernando Estrada

Approved: Prof. Nonoy T. Arroyo Supervisor

Approved: Dr. Vhong Lee Examiner

Approved :

Prof. Cedric Navarro Reader

Date:

March 3, 2020

Page Four (4)

Sample Thesis Table of Contents


Please note: this is only an example. Each School has its own specifications, some of which are stricter than others. Furthermore, each thesis is different and will have different emphases on particular sections. CHECK with your supervisor for advice on length of sections and of the thesis as a whole.
TABLE OF CONTENTS

ABSTRACT ..................................................................................... I TABLE OF CONTENTS ...................................................................... II ACKNOWLEDGEMENTS .................................................................... V LIST OF TABLES.............................................................................. VI LIST OF FIGURES ............................................................................ VII LIST OF ABBREVIATIONS

................................................................. VIII

1 INTRODUCTION ...................................................................... 1 1.1 CYBER TERRORISM .................................................................. 1 1.1.1 COMPUTER ATTACK AND CYBERTERRORISM ............................ 1 1.1.2 TERRORIST CAPABILITIES FOR CYBERATTACK .......................... 2 1.1.3 CYBERTERRORISM - FACT OR FANCY? .................................... 2 1.1.4 1.2 1.2.1 1.2.2 1.2.3 1.3 1.3.1 1.3.2 1.3.3 1.3.4 1.4 1.5 1.6 2
XXX ..................................................................................... 3 XXXX ................................................................................... 3 XXXXX.................................................................................. 3 XXXXXX ................................................................................ 6 XXXXXXX .............................................................................. 8 XX ....................................................................................... 9 XXX ..................................................................................... 9 XXXX

................................................................................... 11

XXXXX.................................................................................. 11 XXXXXX ................................................................................ 12 XXXXXXX.............................................................................. 13 XXXXXXXX ............................................................................ 14 XXXXXXXXX .......................................................................... 15

XXXXXXX ............................................................................ 16

3 REFERENCES......................................................................... 17

TABLE OF CONTENTS

Page Five (5)

LIST OF ILLUSTRATIONS EXECUTIVE SUMMARY CHAPTER 1: INTRODUCTION A. BACKGROUND B. PROBLEM STATEMENT C. DATA D. LIMITATIONS CHAPTER 2: AN EVOLVING CONCEPT A. INFORMATION AGE TERRORISM 1. Information Warfare a. Command and Control Warfare (C2W) 2. Infrastructure Warfare 3. Cyberspace 4. Cyberterrorism a. Weapons of the Cyberterrorist (1) Viruses (2) Trojan Horses (3) Worms (4) Humans (5) Electro-Magnetic Pulse Weapons 5. Technoterrorism 6. Terrorism CHAPTER 3: THE SHIFTING NATURE OF TERRORISM A. TOWARD CYBERTERROR: THE SHIFTING NATURE OF TERRORISM 1. Defining Terror a. Symbolic Violence b. Influence on political behavior c. Extranormality (1) The Weapon (2) The Act (3) The Time and Place (4) Covert and Clandestine Nature (5) Violation of rules of conduct d. Violence 2. Objectives of Terrorism 3. Ability to Cause Terror From Cyberspace CHAPTER 4: SHIFT TOWARD INFORMATION WARFARE ACROSS THE CONFLICT SPECTRUM A. USE OF INFORMATION WARFARE IN STATE SPONSORED ESPIONAGE AND CRIME 1. Who is targeting the United States? a. Soviet Union/Russia b. Bulgaria c. France d. Japan e. China f. Germany g. Iraq h. Swiss i. Seychelles j. Israel

Page (6)

B. USE OF COMPUTERS IN REVOLUTION 1. Poland 2. Tiananmen Square 3. Zapatistas C. THE RISE OF TECHNOTERRORISM 1. Electrical Distribution Networks 2. Attacks on Computer Systems a. Europe and the United States b. Japan c. Political Motivation d. Environment Groups e. Criminal Activity (1) Citibank (2) Viruses (3) Personal Attacks 3.The Threat From Hackers Turned Terrorists: Is it real? 4. The Internet Worm 5. Positive and Negative Elements for the Cyberterrorist CHAPTER 5: CONCLUSIONS A. SHIFTING DEFINITION OF TERRORISM 1. The Role of Violence in Terrorism B. IMPACT ON TERRORISM IN THE FUTURE 1. Demassification 2. New State Sponsors 3. Targeted Message 4. Rise of Disruption not Destruction 5. New Tools for Attacker and Defender a. Offense and Defense in Cyberspace C. RESPONSE TO THE PROBLEM 1. Government Response to the Problem 2. Commercial Response to the Problem 3. The Middle Road D. FUTURE RESEARCH APPENDIX A: TERRORISM TYPOLOGY A. TYPOLOGY 1. From Conventional Terror to Cyberterror APPENDIX B: SAMPLE TERRORISM DEFINITIONS BIBLIOGRAPHY INITIAL DISTRIBUTION LIST NOTES

TITLE PAGE / ABSTRACT SIGATURE PAGE FORMAT

Thesis title. Long titles should be double- spaced and divided for readability Abstract Master's theses: 150 words maximum; Doctoral theses, 350 words maximum; all other degrees see note box below, single-spaced] As a rule, abstracts should b e no longer than 300 words. The signature page is a single page formatted the same as the title page, but it includes the original (not photocopied) signatures of the examing committee. It is not bound with your thesis. Do not include signatures on your title page.

Vous aimerez peut-être aussi