http://www.iaeme.com/IJCIET/index.asp 859 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET)
Volume 9, Issue 2, February 2018, pp. 859–872, Article ID: IJCIET_09_02_083
Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=9&IType=2
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
© IAEME Publication Scopus Indexed
CYBER-TERRORISM AS A NON-STATE CYBER
WARFARE: AN OVERVIEW
Prashant Mali
Amity University Noida, India
J. S. Sodhi
Amity University Noida, India
Triveni Singh
SP Cyber Crime (STF), UP Police, India
Sanjeev Bansal
Amity University Noida, India
ABSTRACT
Cyber warfare figures conspicuously on the motivation of policymakers and military
pioneers far and wide. New units to guarantee cybersecurity are made at different levels
of government, incorporating into the military. Be that as it may, cyber activities in
equipped clash circumstances could have possibly intense outcomes, specifically when
their impact isn't restricted to the information of the focused on PC framework or PC.
Undoubtedly, cyber tasks are generally expected to have an impact on 'this present
reality'. For example, by messing with the supporting PC frameworks, one can control
an adversary's airport regulation frameworks, oil pipeline stream frameworks, or
atomic plants. The potential helpful effect of some cyber activities on the non-military
personnel populace is colossal. It is along these lines vital to examine the principles of
International humanitarian law(IHL) that represent such activities since one of the
primary destinations of this collection of law is to shield the non-military personnel
populace from the impacts of warfare. The article provides an understanding of cyber-
crime as a non-state cyberwarfare by analyzing and identifying the terms and catches
in cyber-crime and cyberwarfare, while comparing different cases and studies around
the globe, challenges, issues and the precautions in the implementation of an
international humanitarian law. The article goes ahead to take a gander at probably
the most essential standards of IHL overseeing the lead of dangers and the translation
in the cyber domain of those guidelines, in particular, the standards of qualification,
proportionality, and safety measure. As for these principles, the cyber domain suggests
various conversation starters that are as yet open. Specifically, the interconnectedness
of cyberspace represents a test to the most key commence of the tenets on the direct of
dangers, to be specific that regular citizen and military articles can and should be