TITLE

Cyberterrorism: The Logic Bomb versus the Truck Bomb

AUTHOR(S)
DENNING, DOROTHY E.
PUB. DATE
September 2000
SOURCE
Global Dialogue;2000, Vol. 2 Issue 4, p1
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
In this article the author talks about the threat of cyberterrorism in the U.S. It refers to a combination of terrorism and cyberspace under which unlawful acts are carried out against government networks and the information stored within. She believes that cyberterrorists have declared a war against the U.S. to challenge its supremacy.These kind of attacks disrupts essential services like power supply, air traffic control etc. She concludes that all kinds of online crime should be taken seriously so that they can be prevented.
ACCESSION #
56659987

 

Related Articles

  • DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR PROFILE. Karthika, S.; Kiruthiga, A.; Bose, S. // International Journal of Network Security & Its Applications;Jul2012, Vol. 4 Issue 4, p93 

    In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more...

  • Ghost in the Machine. Turner, Aimée // Air Traffic Management;Winter2012, Issue 4, p20 

    The article says that according to cyber security experts, the U.S. is not prepared to deal with serious cyber attack and the ADS-B flight tracking technology is vulnerable to such attacks. They say that hackers may exploit the air traffic control software to unleash squadrons of ghost aircraft...

  • Socialno-psiholoÅ¡ke implikacije kibernetskega terorizma. Prislan, Kaja; Bernik, Igor // Varstvoslovje: Journal of Criminal Justice & Security;2013, Vol. 15 Issue 3, p357 

    Purpose: This paper intends to present the synergy between unrealistic notions about technology and terrorism and the cyberterrorists' real capabilities and activities. At the same time, the paper also points to the threat, which must not be neglected from the information security point of view,...

  • Cyber-terror could be a new and unwelcome feature of 2007, according to experts.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p8 

    The article considers the possible prevalence of cyber-terrorism in 2007. In late December 2006, the U.S. government issued a warning to private financial institutions that Al Qaeda was planning to ruin their databases. The idea of terrorists using the Internet as a medium for attacks is not...

  • NEW, SMART TOOLS ADVANCE MONITORING, PROTECT NETWORK. Phifer, Lisa // Information Security;Jul2015, Issue 6, p3 

    The article discusses different ways to employ advanced network security monitoring technologies. Topics covered include the need to effectively identify evolving network threats. Also mentioned is the importance of regularly performing network security monitoring to raise awareness and response...

  • FAA Probes Major Commo Network Outage.  // Air Safety Week;12/14/2009, Vol. 23 Issue 47, p4 

    The article reports that the U.S. Federal Aviation Administration (FAA) has formed an expert panel to examine the reliability of a telecommunications network that broke down last month, affecting air traffic across the country on November 19, 2009. The U.S. aviation agency said the problem...

  • Conflict probe starts rollout.  // Air Traffic Management;Winter2003, Vol. 12 Issue 4, p4 

    Features the User Request Evaluation Tool (URET) system, a conflict probe tool used by air traffic controllers in the U.S. Identification of U.S. cities that have received the system; Features of URET; Advantages to users.

  • How an independent review could make the difference between success and failure. Collins, Tony // Computer Weekly;3/22/2005, p22 

    The article reports that when the consultancy company Arthur D Little was appointed to investigate a potential IT disaster at the Swanwick air traffic control centre in Hampshire, its independent review was welcomed by all, except the organization being audited. In oral and written evidence to...

  • "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE. Brenner, Susan W. // Journal of Criminal Law & Criminology;Winter2007, Vol. 97 Issue 2, p379 

    This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of responding to those threats. First, it divides the process--attribution--into two categories: what-attribution (what...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics