Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Persistent computer security vulnerabilities may expose U.S. critical infrastructure and government computer systems to possible cyber attack by terrorists, possibly affecting the economy or other areas of national security. This report discusses possible cyber capabilities of terrorists and sponsoring nations, describes how computer security vulnerabilities might be exploited through a cyber terror attack, and raises some potential issues for Congress.
Currently no evidence exists that terrorist organizations are actively planning to use computers as a means of attack, and there is disagreement among some observers about whether critical infrastructure computers offer an effective target for furthering terrorists’ goals. However, terrorist organizations now use the Internet to communicate, and news reports have indicated that Al Qaeda and other groups may be using computer technology to help plan future terrorist attacks. At the same time, nuisance attacks against computer systems and the Internet are becomingmore rapid and widespread, indicating that computer system vulnerabilities persist despite growing concerns about possible effects on national security.
This report presents a working definition for the term “cyber terrorism,” plus background information describing how current technology and management processesmay leave computers exposed to cyber attack, and a discussion of possible effects of a cyber attack. …
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Persistent computer security vulnerabilities may expose U.S. critical infrastructure and government computer systems to possible cyber attack by terrorists, possibly affecting the economy or other areas of national security. This report discusses possible cyber capabilities of terrorists and sponsoring nations, describes how computer security vulnerabilities might be exploited through a cyber terror attack, and raises some potential issues for Congress.
Currently no evidence exists that terrorist organizations are actively planning to use computers as a means of attack, and there is disagreement among some observers about whether critical infrastructure computers offer an effective target for furthering terrorists’ goals. However, terrorist organizations now use the Internet to communicate, and news reports have indicated that Al Qaeda and other groups may be using computer technology to help plan future terrorist attacks. At the same time, nuisance attacks against computer systems and the Internet are becomingmore rapid and widespread, indicating that computer system vulnerabilities persist despite growing concerns about possible effects on national security.
This report presents a working definition for the term “cyber terrorism,” plus background information describing how current technology and management processesmay leave computers exposed to cyber attack, and a discussion of possible effects of a cyber attack. …