Cyberterrorism and Information Security
Charles Jaeger, Southern Oregon University
Acts That May Be Cyberterrorism
Other Warnings about Cyberterrorism
Support for Conventional Terrorism
A Five-Level Operational Model
Convergence of the Physical and Virtual Worlds
Vulnerabilities: External, Internal, Other
BGP Tables, DNS Poisoning, and DDoS
Information Technology Professionals
Institutions, Organizations, and Conferences
Small Business and Individuals
Who Will Win the Battle of Cyberterrorism?
INTRODUCTION
In the past several years, the world has come face to face with terrorists who are becoming more extreme. At the same time, the world has become increasingly dependent on using computers and networks to manage the way we work, communicate, and live. Terrorism, used throughout human history in one form or another, has found a powerful new weapon.
Although most terrorist organizations remain either national or regional, cyberspace gives them tools to become global in reach and coordination. A cyberattacked nuclear power ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.