Hi, please

Cyberterrorism

Required Reading:

What is cyberterrorism?  Even experts can’t agree

The government has failed to convene its various departments to forge a single definition. The FBI alone has published three distinct definitions of cyber-terrorism.

Required Listening:

Richard Clark on the Growing “Cyberwar” Threat

Clarke says that cyberattacks can come from another country — or from a lone individual. Malicious code may infect a computer via a security flaw in a Web browser, or it could be distributed through secret back doors built into computer hardware. And though the government has set up security measures to protect military and intelligence networks, he worries that not enough is being done to protect the private sector — which includes the electrical grid, the banking system and our health care records.

Recommended Listening:

Assessing the Threat of Cyberterrorism

Lewis says that an attack can be simple and crude: malicious software placed on a thumb drive and left in a parking lot can wreak havoc on a computer system. He predicts that within a decade, Al Qaeda will develop capabilities to carry out attacks on the web — but says that terrorists may not bring down the entire Internet because they also realize the benefits.

Recommended Reading:

The battle against cyberterror

The cyberthreat to the electricity we use and the water we drink is real, experts say, but there’s no need to panic – at least not yet.

Similar Posts: