The changing nature of cyber conflicts in the era of information technology marks a noticeable shift from physical realms towards digital realms, wherein nation-states and non-state actors effectively leverage cyberspace for political, social, ideological and economic purposes. Asymmetry Conflict is in its central theme of cyberterrorism. With limited resources, supply chains and logistics, power-deficient groups effectively leverage cyberspace, against strong adversaries through coordinated cyberattacks on critical infrastructure including, energy, finance, transportation, healthcare, defense and communication. The difficulty of attribution allows non-state actors to effectively leverage cyberspace by acting freely and challenging the conventional deterrence capabilities of the state. Further, terrorist organizations prefer decentralized networks making them highly adaptable and resilient. With unclear boundaries between cybercrime and cyberterrorism it becomes challenging to comprehend such security scenarios
- https://www.dictionary.com/browse/anonymity
- https://www.heritage.org/sites/default/files/201910/2015_IndexOfUSMilitaryStrength_What%20Is%20National%20Security.pdf
- https://www.cisa.gov/topics/physical-security/insider-threat-mitigation
- https://cytrain.ncrb.gov.in/staticpage/pdf/Cyber-security-tips-by-cyber-dost.pdf
- https://www.scribd.com/document/21173253/Mark-M-Pollitt-Cyber-Terrorism-Fact-or-Fancy
- https://www.britannica.com/topic/asymmetrical-warfare
- https://www.dictionary.com/browse/anonymity
- https://aws.amazon.com/shield/ddos-attack-protection
- https://brainly.in/question/60292867
- https://www.youtube.com/watch?v=DxjvbrKgiLA
- https://www.unodc.org/e4j/zh/cybercrime/module-14/key-issues/cyberterrorism.html
- https://melapress.com/wordpress-website-defacement-how-to-monitor-detect-and-prevent
- https://www.zerofox.com/solutions/executive-protection/disruption-services
- https://attack.mitre.org/techniques/T1485
- https://actdigital.com/en/insights/data-theft-risks-consequences-and-how-to-avoid-it
- https://www.legis.iowa.gov/docs/code/716.11.pdf
- https://www.merriam-webster.com/dictionary/propaganda
- https://www.fatf-gafi.org/content/dam/fatf-gafi/reports/Financing-Recruitment-for Terrorism.pdf.coredownload.inline.pdf
- https://www.apa.org/topics/journalism-facts/misinformation-disinformation
- https://www.techuk.org/resource/synthetic-media-what-are-they-and-how-are-techuk-members-taking-steps-to-tackle-misinformation-and-fraud.html
- https://www.stophateuk.org/about-hate-crime/what-is-online-hate-crime
- https://www.educateagainsthate.com/what-is-extremism
- https://medium.com/amnesty-insights/manipulation-of-public-opinion
- https://www.webasha.com/blog/ai-powered-ethical-hacking-how-artificial-intelligence-is-revolutionizing-penetration-testing
- https://www.oaepublish.com/articles/jsss.2022.07.