top of page

Digital Havoc: Understanding And Countering Cyber Terrorism




Pranay Pathak, Vivekananda Institute of Professional Studies


ABSTRACT


Cyber terrorism has emerged as one of the most dangerous forms of terrorism which is now a great threat to national and global security in the digital age. It uses computer networks and information systems to cause disruption, fear, or physical destruction with ideological, political, or religious motivation. Unlike other cybercrimes, cyber terrorism aims to target critical infrastructure, military systems and governance mechanisms. This article explores the contours of cyber terrorism by examining technical patterns, motivations, and methods such as Advanced Persistent Threats (APTs), DDoS attacks, and ransomware. It further delves into real life cases including in India and abroad, to analyze the potential and real-world implication of cyber threats. Legal provisions under the Information Technology Act, 2000 and the Unlawful Activities (Prevention) Act, 1967 are critically analyzed along with international norms like the Budapest Convention and Tallinn Manual. The article also discusses the institutional response and policy gaps. It concludes by recommending legislative reforms, improved cross-border cooperation, and enhanced public-private collaboration to address the evolving threat landscape.


Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Licensing: 

 

All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

 

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page