Chapter 3. Cyber Terrorism and Other Hidden Threats
The subject of cyber terrorism is controversial and fear-inducing—and it’s impossible to overlook in the context of this book’s premise. Based on the research I conducted for this chapter, it’s clear that governments and businesses all over the world have made reducing the threat of cyber terrorism and espionage a high priority.
Countless books, seminars, and conferences cover this topic. There are technology companies and government agencies solely focused on securing our IT infrastructures. Although security is certainly the main priority when it comes to protecting our nations and their citizens, the point of this chapter on cyber attacks, fraud, and overall threats to how we work and live ...
Get Glitch: The Hidden Impact of Faulty Software now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.