Cyber-Terrorism Threats, Vulnerabilities, Consequences & Emerging/Future Defense Technologies


Click here to start

Table of contents

Cyber-Terrorism Threats, Vulnerabilities, Consequences & Emerging/Future Defense Technologies

Outline

1991: Gore Declared War

Small Things

T &V & C => Risk

Is there a Cyber-Terrorist Threat?

What could a CT do?

Examples: corruption

Examples: denial of services

Examples: information leaks

Key Defensive Technologies*

Deception

Trusted Systems

Forensics

Benevolent Viruses

Social issues

Summary

Author: Fred Cohen

E-mail: fc@all.net

Best viewed with
StarOffice