Cyber-Terrorism

Cyber-Terrorism

Lech J. Janczewski (University of Auckland, New Zealand) and Andrew M. Colarik (University of Auckland, New Zealand)
DOI: 10.4018/978-1-59140-583-2.ch003
OnDemand PDF Download:
$37.50

Abstract

In this time of increased threats of terrorist attacks, are IT professionals really facing a new type of danger resulting from these activities? In our opinion, the answer is both yes and no. Let us explain. Major information system users, such as government agencies, military installations, major banks, and so forth, were and are prepared for handling such attacks. The destruction of part of the Pentagon in Washington, D.C. did not stop the U.S. Department of Defense from functioning, nor did the collapse of the Twin Towers create a permanent crisis on Wall Street. The fact is, however, that trading on the New York Stock Exchange was suspended for some time, and many small companies with offices in the Twin Towers did not survive the disaster. But no long-term nationwide disruption was triggered, in an economical sense. Similar attacks have happened to other large corporations, and their consequences have been minimized through redundancy implementations and considerable resources. On the other hand, most businesses are small to medium sized and, as such, may not be prepared to handle terrorist threats due to the lack of resources (i.e., specialized skill sets, facilities, etc.).

Complete Chapter List

Search this Book:
Reset
Dedication
Lech Janczewski, Andrew Colarik
Table of Contents
Acknowledgments
Lech Janczewski, Andrew Colarik
Chapter 1
Lech J. Janczewski, Andrew M. Colarik
The current state of the information security domain in the United States and much of the rest of the industrialized world can best be characterized... Sample PDF
Information and Computer Security
$37.50
Chapter 2
Lech J. Janczewski, Andrew M. Colarik
The events surrounding the attacks against the World Trade Center (February 26, 1993 and September 11, 2001) and the Pentagon (September 11, 2001)... Sample PDF
The Nature of Terrorism
$37.50
Chapter 3
Cyber-Terrorism  (pages 40-60)
Lech J. Janczewski, Andrew M. Colarik
In this time of increased threats of terrorist attacks, are IT professionals really facing a new type of danger resulting from these activities? In... Sample PDF
Cyber-Terrorism
$37.50
Chapter 4
Physical Security  (pages 61-84)
Lech J. Janczewski, Andrew M. Colarik
The final stage in the execution of the majority of the current waves of terrorist attacks is in the form of an intruder positioning a bomb in the... Sample PDF
Physical Security
$37.50
Chapter 5
Lech J. Janczewski, Andrew M. Colarik
n the early 1960s, programmers used to play memory games on a computer. The objective of the game was to disable as much of the operating system... Sample PDF
Denial of Service Threat
$37.50
Chapter 6
Lech J. Janczewski, Andrew M. Colarik
The mass use of the Internet as a trade and distribution tool has become the source of a new type of attack—the defacement of Web page content. Due... Sample PDF
Web Defacements and Semantic Attacks
$37.50
Chapter 7
DNS Attacks  (pages 106-109)
Lech J. Janczewski, Andrew M. Colarik
The Domain Name Service (DNS) is a mechanism for recognizing and translating domain name addresses. These operations are carried out by devices... Sample PDF
DNS Attacks
$37.50
Chapter 8
Routing Vulnerabilities  (pages 110-118)
Lech J. Janczewski, Andrew M. Colarik
The graphic visualization of the Internet is usually presented as a mesh of connections among millions of nodes engaged in the transmission of... Sample PDF
Routing Vulnerabilities
$37.50
Chapter 9
Identity Stealing Attacks  (pages 119-128)
Lech J. Janczewski, Andrew M. Colarik
In recent years, several feature films have been produced based on the concept of stealing an identity. As a result of deliberate or accidental... Sample PDF
Identity Stealing Attacks
$37.50
Chapter 10
Lech J. Janczewski, Andrew M. Colarik
It is a known fact that terrorists are developing a keen set of technology skills to further their agendas. As previously stated, they use IT for... Sample PDF
Identification, Authentication, and Access Control
$37.50
Chapter 11
Personnel Security  (pages 163-174)
Lech J. Janczewski, Andrew M. Colarik
The importance of security issues relating to personnel policies has and continues to be a factor in the overall protection of organizational... Sample PDF
Personnel Security
$37.50
Chapter 12
Operations Management  (pages 175-198)
Lech J. Janczewski, Andrew M. Colarik
A major focus of this book is guiding IT managers on how to secure the operations of their facilities due to increased threats from terrorist... Sample PDF
Operations Management
$37.50
Chapter 13
Lech J. Janczewski, Andrew M. Colarik
In Chapter 12, we discussed most of the information security issues that are important to IT managers, especially in the current situation of... Sample PDF
Information Security Policy
$37.50
Chapter 14
Lech J. Janczewski, Andrew M. Colarik
Business continuity management is a process aimed at reducing disruptions caused by disasters and security failures that could be the results of... Sample PDF
Business Continuity Management
$37.50
Epilogue: Thoughts for the Future
About the Authors