80 ◾ Risk Assessment and Security
and alerts are sent through the Federal Aviation Administration so that a ight in
potential danger can consider what course of action to take to minimize radiation
exposure (NASA 2012a).
2.10 Cyberterrorism
A cyberattack perpetrated by nation states or violent extremist groups could be as
destructive as the terrorist attack of September 11 (US DoD 2012). Clay Wilson
(2005), in his report, identies three dierent methods of attack, based on the
eects of the weapons used:
◾ A physical attack involves conventional weapons directed against a computer
facility or its transmission lines. A physical attack is implemented either
through the use of conventional weapons, creating heat, blast, and fragmen-
tation, or ...