Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Information technology (IT) is essential to virtually all critical infrastructures, making them vulnerable to a terrorist attack. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. This report states that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. It presents two recommendations on what can be done in the short term to protect communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Information technology (IT) is essential to virtually all critical infrastructures, making them vulnerable to a terrorist attack. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. This report states that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. It presents two recommendations on what can be done in the short term to protect communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.