TITLE

Why does this feel wrong?

AUTHOR(S)
Bradner, Scott
PUB. DATE
January 2000
SOURCE
Network World;01/17/2000, Vol. 17 Issue 3, p41
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the ramifications of the plans of the United States government to combat cyberterrorism. Infrastructure and components of the National Plan for Information Systems Protection; Plans to deploy the Federal Intrusion Detection Network.
ACCESSION #
2714189

 

Related Articles

  • Terrorists Can Travel Internet To Spread Viruses, Wreak Havoc. Emrich, Anne Bond // Grand Rapids Business Journal;10/1/2001, Vol. 19 Issue 40, p1 

    Reports on the rise in business players in the areas of Internet security, network security and hardware and software solutions designed to prevent terrorism threats in Michigan. Services provided by Computer Products and Resources (CPR); Clients of CPR.

  • Status quo a danger to US infrastructure. Langevin, Jim // Hill;4/26/2012, Vol. 19 Issue 52, p22 

    The article reports that the U.S. House Homeland Security subcommittee that oversees cybersecurity unanimously approved the Precise Act.

  • Where's the evidence that data retention combats terrorism? Woolfson, Marc // New Media Age;8/11/2005, p12 

    The article deals with the efforts of the government of Great Britain to secure a data retention regime. One of the government's first acts in the aftermath of the bombings in London, England on July 7, 2005 was to reignite plans for a European regime of mandatory retention of communications...

  • Changing Views of Online Surveillance. McKean, Kevin // PCWorld;Jan2002, Vol. 20 Issue 1, p15 

    Focuses on how attitudes have changed toward computer and Internet security following the September 11 terrorist attacks. Concerns about potential threats to civil liberties; Mention of articles in this issue which address privacy and security concerns; Thoughts on how this magazine has started...

  • Safer Passage. Spangler, Todd // Interactive Week;10/15/2001, Vol. 8 Issue 40, p47 

    Evaluates whether the Internet would guarantee acceptable security for its users in the U.S. Criticism on the implementation of security measures for Internet data; Comparison of threat to computer security and terrorism; Recognition of the need to improve federal laws on cybercrimes.

  • Bugs that can bite. Stein, Lisa // U.S. News & World Report;12/16/2002, Vol. 133 Issue 23, p15 

    Have terrorists infiltrated the government's top-secret computers? U.S. Federal government agencies raided Ptech Inc., a software firm in Quincy, Massachusetts, whose clients include the U.S. Federal Bureau of Investigation (FBI), the U.S. Air Force, and the U.S. House of Representatives. U.S....

  • Outside Experts: JARED COHON. Caruso, Lisa; Gorman, Siobhan; Lunney, Kellie; Munro, Neil; Sangillo, Gregg; Serafini, Marilyn Werber; Vaida, Bam // Government Executive;2/15/2004, Vol. 36 Issue 3, p107 

    The article presents information on Jared Cohon is president of Pennsylvania's Carnegie Mellon University, and he chairs the Academe and Policy Research Senior Advisory Committee within the president's Homeland Security Advisory Council. He and his panel will also ensure that the university...

  • DHS Seeks More Standardization for its Computer Systems through FirstSource II.  // TR2: Terror Response Technology Report;10/26/2011, Vol. 7 Issue 22, p3 

    The article discusses plans by the U.S. Department of Homeland Security (DHS) to acquire more standardized computers and related equipment as part of a follow-on procurement to its FirstSource program. It cites the FirstSource 2 as an acquisition strategy document that will incorporate salient...

  • Back Up Firewalls With Strong Crypto. Begley, Sharon // Newsweek;11/5/2001, Vol. 138 Issue 19, p38 

    Discusses the susceptibility of computer systems in the United States to a terrorist attack. Idea that the power grid and telephone network depend on computers; Ways to prevent the attack, including back-up systems; Role of encryption programs.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics