Show simple item record

dc.contributor.authorFernando, SCTS
dc.contributor.authorWijesundara, WMRK
dc.contributor.authorWelaratne, DNY
dc.date.accessioned2024-03-13T07:25:49Z
dc.date.available2024-03-13T07:25:49Z
dc.date.issued2023-09
dc.identifier.urihttp://ir.kdu.ac.lk/handle/345/7305
dc.description.abstractSince the dawn of information technology, terrorists have used cyberspace as a weapon to carry out their intentions. At the moment, cyber technology provides cyber terrorists with a comprehensive and complicated set of information and instruments with which to continue their attacks on governments. The usage of tools and the motivations of cyber terrorism have an impact on cyber security and data protection both directly and indirectly. This study identifies the effect of cyber terrorism on cyber security and data protection and focuses on the relevant cases that have arisen out of cyber terrorism and legal frameworks that have established in addressing cyber terrorism, cyber security, and data protection. The study analyses the new trends of cyber security risks arising through cyber terrorism and examine how data breaches affect privacy and leads to cyber-terrorism. This primary research is evident almost at every stage of cyber-attack it affects cyber security and data protection as a subsidiary result. This study has identified the insufficiency of the laws addressing cyber terrorism. This qualitative research is primarily supported by case laws, journal articles and statues. Primarily it evident the necessity of separated direct laws as well as penal code recognition for cyber terrorism and the amendments should be taken place to address cyber terrorism, cyber security, and data protection from time to time depending on the innovations of cyber technology, for the perception of minimizing the terrorist attacks and negative impacts on it.en_US
dc.language.isoenen_US
dc.subjectInformation technologyen_US
dc.subjectCyber terrorismen_US
dc.subjectCyber securityen_US
dc.subjectData protectionen_US
dc.subjectCyber spaceen_US
dc.titleEquilibrium of Cybersecurity and Data Privacyen_US
dc.title.alternativeAnalysing Cyber Terrorism in International Contexten_US
dc.typeArticle Full Texten_US
dc.identifier.facultyFaculty of Lawen_US
dc.identifier.pgnos36-42en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record