TITLE

IT TO PLAY CENTRAL ROLE IN TERRORIST FIGHT

AUTHOR(S)
Lundquist, Eric
PUB. DATE
October 2001
SOURCE
eWeek;10/1/2001, Vol. 18 Issue 39, p3
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on the role of information technology in fighting terrorism in the United States. Prevalence of Nimda worm through the Internet; Use of the Internet for security monitoring of products; Danger of storing large amounts of data.
ACCESSION #
5344591

 

Related Articles

  • Fighting Terrorism with Information. Strickland Jr., Lee S. // Information Management Journal;Jul2002, Vol. 36 Issue 4, p27 

    Examines the contribution of information technology as a tool against terrorism in the U.S. Functions of intelligence organizations; Components of information networks; Approaches to fight terrorism.

  • Is U.S. ready for cyberwarfare? Maier, Timothy W. // Insight on the News;04/05/99, Vol. 15 Issue 13, p18 

    Casts doubt on the United State's capability to handle terrorism through electronic technology. Illustration of how computer technology is utilized by terrorists; Plans of the U.S. government to create a `cyberdefense' plan; Nations hiring advanced computer programmers to break into U.S....

  • Five Hot Legal Issues. Orich, Christine // Indiana Business Magazine;Dec2003, Vol. 47 Issue 12, p29 

    Discusses legal issues affecting information technology in the United States. Sarbanes-Oxley Act; The USA Patriot Act, an anti terrorism law; The Linux Litigation; Database Rights Legislation; Global IT Commerce.

  • The Need to Know.  // Governing;Apr2005, Vol. 18 Issue 7, p1A 

    Discusses the use of information technology by U.S. state and local governments to prevent terrorism. Challenge in deciding who needs the information collected; Identification of critical infrastructures and assets that might be attractive to terrorists; Preparation for and response to a...

  • Privacy vs. Safety. Olsen, Stefanie; Hansen, Evan // Fortune;Winter2002 Tech Review, Vol. 144 Issue 10, p29 

    Reports on the ways a terrorist threat can shift priorities from privacy to safety. Possible implications of increased powers of surveillance for law enforcement; How information technology can threaten privacy.

  • statements.  // Government Technology;Nov2003, Vol. 16 Issue 14, p56 

    Focuses on issues and events related to the use of government information technology in several U.S. states, as of November 2003. Launch of a pilot program to bring laptop computers into classrooms by New Hampshire Governor Craig Benson; Development of a product that uses sound waves to reduce...

  • Fighting Terrorism With Technology. Branscomb, Lewis M.m // CIO Insight;Sep2002, Issue 18, p46 

    Interviews Harvard University professor Lewis M. Branscomb concerning the use of information technology (IT) to fight against terrorism in the United States. Vulnerability points in the IT infrastructure; Ways to improve physical security of the Internet; Need for guidance to private industry...

  • Terrorists Infiltrating Startups? Bangalore Police To Make Police Verification Mandatory For All New Recruits.  // Trak.in;10/1/2015, p2 

    The article reports on intelligence inputs received by the police in Bangalore, India, that terrorists and extremists are infiltrating information technology (IT) startups in the city. The police will conduct mandatory verification for all employees of IT startups. The police has only received...

  • Terror's Next Target? Sherman, Erik // Newsweek (Pacific Edition);10/22/2001 (Pacific Edition), Vol. 138 Issue 17, p54 

    Discusses the vulnerability of power plants and other critical facilities to potential terrorist attacks due to security holes in information systems. Previous incidence of electronic warfare; Reasons why utilities, telecommunications facilities and factories have always been vulnerable to...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics