Cyberterroism in Today's World

Adler, John
July 2003
Electronic News;7/7/2003, Vol. 49 Issue 27, pN.PAG
Trade Publication
Focuses on the role of computer security systems in the fight against cyberterrorism. Consequences of cyberterrorism on the computer networks of companies, organizations and the government agencies; Actions that should be taken by the U.S. government to keep data networks as secure as possible; Concerns of information technology managers about the possible threats of computer hackers.


Related Articles

  • HUNGARIAN EXPERIENCES IN THE LIGHT OF CYBER ATTACKS IN 2011. Szilárd, Török // Hadmérnök;jun2012, Vol. 7 Issue 2, p342 

    In my evaluation analysis I would like to present the published definition and regulation background of Critical Information Infrastructure and its possible cyber protection methods. Based on the public IT security incidents of year 2011, the extent of the attacks and the technological...

  • DON'T BE A DATA LOSS VICTIM. Musthaler, Linda // Network World;2/9/2009, Vol. 26 Issue 6, p22 

    The article reports on the move of Verizon's Business investigative Response team to conduct an investigation which aims to unravel the mystery data breaches and track down computer hackers who are masterminding it in the U.S. According to the article, most of the hack have been made by people...

  • Correlation and Diamonds Used to Confound Intrusion.  // IT Professional;May/Jun2006, Vol. 8 Issue 3, p5 

    The article focuses on the reports made by Baseline magazine with regards to computer hackers making lucrative activities in a low profile. According to them, losses per respondent soared in terms of propriety information thefts, from $168, 529 in 2004, to $355, 552 in 2005, considering the 2005...

  • Cybercrime comes of age.  // ITNOW;Mar2007, Vol. 49 Issue 2, p6 

    The article gives a global analysis of cybercrime and shows why misuse, abuse and fraud is now a major compliance issue. Cybercrime has emerged since 1988 when the Morris worm, considered by many to be the first piece of malware and the first to gain widespread media attention, hit the internet....

  • A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict. Podins, Karlis; Czosseck, Christian // Proceedings of the European Conference on Information Warfare & ;2012, p198 

    Throughout history, mankind has developed and employed novel weapons systems and equally novel countermeasures. Naturally, both offensive and defensive systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those...

  • Defending the Enterprise. Ali Pabrai, Uday O. // Certification Magazine;Jul2003, Vol. 5 Issue 7, p26 

    Discusses how business owners can secure their firms from cyber-attacks of hackers. Results of the Computer Crime and Security Survey by the Computer Security Institute and the Computer Intrusion Squad of the San Francisco Federal Bureau of Investigation; Types of attacks to computer networks;...

  • Sporting websites face more extortion threats. Ilett, Dan // SC Magazine: For IT Security Professionals;Mar2004, p8 

    The article reports on the continued extortion threats issued by hackers against online betting companies in Great Britain as of March 2004. Online betting companies are being blackmailed to pay up or face distributed denial-of-service attacks (DDoS), a coordinated computer attack that disables...

  • A Growing Threat. Coyne, Frank J. // Best's Review;Sep2004, Vol. 105 Issue 5, p114 

    Comments on the vulnerability of computer networks to catastrophic threats. Steps in providing insurance against threats; Factors contributing to the increase in the frequency, cost and sophistication of cyber-attacks; Lack of standardized contracts in the market for cyberrisk insurance.

  • Connection Hijacking.  // Network Dictionary;2007, p118 

    A definition of the term "Connection Hijacking" is presented. Also known as Man In the Middle Attack, it refers to an attack when a malicious party intercepts a legitimate communication between two hosts to control the flow of communication and alter or eliminate the information sent by one of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics