http://www.iaeme.com/IJCIET/index.asp 859 editor@iaeme.com International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 2, February 2018, pp. 859–872, Article ID: IJCIET_09_02_083 Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=9&IType=2 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 © IAEME Publication Scopus Indexed CYBER-TERRORISM AS A NON-STATE CYBER WARFARE: AN OVERVIEW Prashant Mali Amity University Noida, India J. S. Sodhi Amity University Noida, India Triveni Singh SP Cyber Crime (STF), UP Police, India Sanjeev Bansal Amity University Noida, India ABSTRACT Cyber warfare figures conspicuously on the motivation of policymakers and military pioneers far and wide. New units to guarantee cybersecurity are made at different levels of government, incorporating into the military. Be that as it may, cyber activities in equipped clash circumstances could have possibly intense outcomes, specifically when their impact isn't restricted to the information of the focused on PC framework or PC. Undoubtedly, cyber tasks are generally expected to have an impact on 'this present reality'. For example, by messing with the supporting PC frameworks, one can control an adversary's airport regulation frameworks, oil pipeline stream frameworks, or atomic plants. The potential helpful effect of some cyber activities on the non-military personnel populace is colossal. It is along these lines vital to examine the principles of International humanitarian law(IHL) that represent such activities since one of the primary destinations of this collection of law is to shield the non-military personnel populace from the impacts of warfare. The article provides an understanding of cyber- crime as a non-state cyberwarfare by analyzing and identifying the terms and catches in cyber-crime and cyberwarfare, while comparing different cases and studies around the globe, challenges, issues and the precautions in the implementation of an international humanitarian law. The article goes ahead to take a gander at probably the most essential standards of IHL overseeing the lead of dangers and the translation in the cyber domain of those guidelines, in particular, the standards of qualification, proportionality, and safety measure. As for these principles, the cyber domain suggests various conversation starters that are as yet open. Specifically, the interconnectedness of cyberspace represents a test to the most key commence of the tenets on the direct of dangers, to be specific that regular citizen and military articles can and should be