Cyber Terrorism and Information Warfare

Cyber Terrorism and Information Warfare
Author: Yonah Alexander
Publisher:
Total Pages: 0
Release: 2001
Genre: Computer networks
ISBN: 9781571052254

Cyber terrorism is an emerging new mode of information warfare underscoring the perpetrators' deliberate exploitation of civilian and military systems' inherent vulnerabilities, thereby affecting national and global security. This volume includes contributions made by academics, policymakers, and professionals at seminars and conferences co-sponsored by the International Center for Terrorism Studies (Potomac Institute for Policy Studies), and the Terrorism Studies Center (The George Washington University), during the past several years. It also includes statements by key government officials and industry experts at different forums in the United States dealing with both threats and responses.

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
Author: Clay Wilson
Publisher:
Total Pages: 35
Release: 2003
Genre: Cyberterrorism
ISBN:

Persistent computer security vulnerabilities may expose U.S. critical infrastructure and government computer systems to possible cyber attack by terrorists, possibly affecting the economy or other areas of national security. This report discusses possible cyber capabilities of terrorists and sponsoring nations, describes how computer security vulnerabilities might be exploited through a cyber terror attack, and raises some potential issues for Congress. Currently no evidence exists that terrorist organizations are actively planning to use computers as a means of attack, and there is disagreement among some observers about whether critical infrastructure computers offer an effective target for furthering terrorists' goals. However, terrorist organizations now use the Internet to communicate, and news reports have indicated that Al Qaeda and other groups may be using computer technology to help plan future terrorist attacks. At the same time, nuisance attacks against computer systems and the Internet are becoming more rapid and widespread, indicating that computer system vulnerabilities persist despite growing concerns about possible effects on national security.