Chapter 17

Cyber Terrorism

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

images Defend against computer-based espionage.

images Employ defenses against computer-based terrorism.

images Choose appropriate defense strategies for your network.

images Employ defenses against information warfare.

Introduction ...

Get Network Defense and Countermeasures: Principles and Practices, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.