Table of contentsCyber-Terrorism Threats, Vulnerabilities, Consequences & Emerging/Future Defense Technologies
Outline
1991: Gore Declared War
Small Things
T &V & C => Risk
Is there a Cyber-Terrorist Threat?
What could a CT do?
Examples: corruption
Examples: denial of services
Examples: information leaks
Key Defensive Technologies*
Deception
Trusted Systems
Forensics
Benevolent Viruses
Social issues
Summary
|
Author: Fred Cohen
E-mail: fc@all.net
Best viewed with
|