Exploresearch (ISSN: 3048-815X) ( Vol. 03 | No. 2 | April - June, 2026 )

The Dynamics of Cyber Terrorism

Author: Dr. Omkar Sonawane

The changing nature of cyber conflicts in the era of information technology marks a noticeable shift from physical realms towards digital realms, wherein nation-states and non-state actors effectively leverage cyberspace for political, social, ideological and economic purposes. Asymmetry Conflict is in its central theme of cyberterrorism. With limited resources, supply chains and logistics, power-deficient groups effectively leverage cyberspace, against strong adversaries through coordinated cyberattacks on critical infrastructure including, energy, finance, transportation, healthcare, defense and communication. The difficulty of attribution allows non-state actors to effectively leverage cyberspace by acting freely and challenging the conventional deterrence capabilities of the state. Further, terrorist organizations prefer decentralized networks making them highly adaptable and resilient. With unclear boundaries between cybercrime and cyberterrorism it becomes challenging to comprehend such security scenarios

Sonawane, O. (2026). The Dynamics of Cyber Terrorism. Exploresearch, 03(01), 15–21. https://doi.org/10.62823/ExRe/2026/03/02.194

  1. https://www.dictionary.com/browse/anonymity
  2. https://www.heritage.org/sites/default/files/201910/2015_IndexOfUSMilitaryStrength_What%20Is%20National%20Security.pdf
  3. https://www.cisa.gov/topics/physical-security/insider-threat-mitigation
  4. https://cytrain.ncrb.gov.in/staticpage/pdf/Cyber-security-tips-by-cyber-dost.pdf
  5. https://www.scribd.com/document/21173253/Mark-M-Pollitt-Cyber-Terrorism-Fact-or-Fancy
  6. https://www.britannica.com/topic/asymmetrical-warfare
  7. https://www.dictionary.com/browse/anonymity
  8. https://aws.amazon.com/shield/ddos-attack-protection
  9. https://brainly.in/question/60292867
  10. https://www.youtube.com/watch?v=DxjvbrKgiLA
  11. https://www.unodc.org/e4j/zh/cybercrime/module-14/key-issues/cyberterrorism.html
  12. https://melapress.com/wordpress-website-defacement-how-to-monitor-detect-and-prevent
  13. https://www.zerofox.com/solutions/executive-protection/disruption-services
  14. https://attack.mitre.org/techniques/T1485
  15. https://actdigital.com/en/insights/data-theft-risks-consequences-and-how-to-avoid-it
  16. https://www.legis.iowa.gov/docs/code/716.11.pdf
  17. https://www.merriam-webster.com/dictionary/propaganda
  18. https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Financing-Recruitment-for Terrorism.pdf.coredownload.inline.pdf
  19. https://www.apa.org/topics/journalism-facts/misinformation-disinformation
  20. https://www.techuk.org/resource/synthetic-media-what-are-they-and-how-are-techuk-members-taking-steps-to-tackle-misinformation-and-fraud.html
  21. https://www.stophateuk.org/about-hate-crime/what-is-online-hate-crime
  22. https://www.educateagainsthate.com/what-is-extremism
  23. https://medium.com/amnesty-insights/manipulation-of-public-opinion
  24. https://www.webasha.com/blog/ai-powered-ethical-hacking-how-artificial-intelligence-is-revolutionizing-penetration-testing
  25. https://www.oaepublish.com/articles/jsss.2022.07.

DOI:

Article DOI: 10.62823/ExRe/2026/03/02.194

Download Full Paper: