On guard

Kisiel, Ralph
December 2001
Automotive News;12/3/2001, Vol. 76 Issue 5960, p2T
Trade Publication
Focuses on the influence of cyberterror threat to strengthen network security from the auto industry in the United States. Investments on security application software; Increase awareness on security; Potential of cyberterrorism in the collaboration between automakers and suppliers over the Internet. INSET: New awareness..


Related Articles

  • UK to roll out cyber safety plan.  // Process Engineering;Nov/Dec2012, Vol. 93 Issue 6, p21 

    The article reports on the plan of the British government to launch a collaborative initiative with industry aimed at reducing the vulnerability of the country to cyber attack in 2013.

  • Navy Officer Warns Of 'Cyber Mania,' Says More Cyber Value Needed With Processes. Biesecker, Calvin // Defense Daily;11/13/2015, Vol. 268 Issue 31, p3 

    The article reports on the topics discussed by U.S. Navy Captain John Zimmerman at the Open Architecture conference of the magazine on November 4, 2015 in the U.S. including cyber risks, vulnerabilities and challenges and risk understanding and assessment to address the challenges.

  • Cyber resilience: A review of critical national infrastructure and cyber security protection measures applied in the UK and USA. Harrop, Wayne; Matteson, Ashley // Journal of Business Continuity & Emergency Planning;Winter2013/2014, Vol. 7 Issue 2, p149 

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known...

  • A LONG AND WINDING ROAD FOR CYBERSECURITY COOPERATION BETWEEN JAPAN AND THE UNITED STATES. Matsubara, Mihoko // Harvard Asia Quarterly;Spring/Summer2012, Vol. 14 Issue 1/2, p103 

    Tokyo and Washington publicly announced their cooperation on cybersecurity for the first time in June 2011. As two of the most economically and politically powerful actors in the world, both Japan and the United States have more to lose than most other countries in the face of cyber threats and...

  • UNTITLED. Ashford, Warwick // Computer Weekly;7/27/2010, p24 

    The article reports on the agreement signed by several countries including the U.S., Great Britain and China at the United Nations (U.N.) to reduce the threat of cyber attacks. Robert Knake, a cyberwarfare expert, says that the agreement will make a great impact in the U.S. position and its...

  • 15 Tips to Minimize Cyber Exposure. Hillebrand, Melissa // Claims;Nov2014, Vol. 62 Issue 11, p11 

    The article presents tips for companies to minimize exposure to cyber attacks which include using passwords that are at least eight characters and contain both uppercase and lowercase letters, turning on screen locking on the mobile device, and making sure wireless networks are password protected.

  • Don't hack back. HOLMES, GORDON // Computer Shopper;Apr2016, Issue 338, p12 

    The author shares his views on a proposal that victims of cyberattacks should retaliate and attack back the hackers. Topics discussed include the plans to launch legislation in the U.S. that will support companies that retaliate against cyberattacks, hackers' strategy of not using their own...

  • Have We Really Seen These Attacks Before? Lidestri, Matt // Banking New York;Fall2011, Issue 19, p8 

    The article discusses attacks on online networks whereby millions of customer records were exposed. These networks include Epsilon and the Sony PlayStation. Security breaches are not new but the author warns that consumers are at greater risk because network operators like Apple and Google...

  • One on One: THE PRESIDENT'S CYBER CZAR LEADS THE CHARGE AGAINST A NEW BREED OF FOE. Fletcher, Michael A. // U.S. Black Engineer & Information Technology;Summer2010, Vol. 34 Issue 3, p6 

    An interview with U.S. cyber security coordinator Howard A. Schmidt is presented. Schmidt says that the Internet can be a vehicle for cyber crimes, economic espionage and cyber attacks seen from other countries. He adds that exploitation of sensitive data compromises the nation's economic...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics