Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
|
Buy Now
Computer Attack & Cyberterrorism (Paperback)
Loot Price: R1,136
Discovery Miles 11 360
You Save: R548
(33%)
|
|
Computer Attack & Cyberterrorism (Paperback)
Expected to ship within 12 - 17 working days
|
Many international terrorist groups now actively use computers and
the Internet to communicate, and several may develop or acquire the
necessary technical skills to direct a co-ordinated attack against
computers in the United States. A cyberattack intended to harm the
U.S. economy would likely target computers that operate the
civilian critical infrastructure and government agencies. However,
there is disagreement among some observers about whether a
co-ordinated cyberattack against the U.S. critical infrastructure
could be extremely harmful, or even whether computers operating the
civilian critical infrastructure actually offer an effective target
for furthering terrorists' goals. While there is no published
evidence that terrorist organisations are currently planning a
co-ordinated attack against computers, computer system
vulnerabilities persist world-wide, and initiators of the random
cyberattacks that plague computers on the Internet remain largely
unknown. Reports from security organisations show that random
attacks are now increasingly implemented through use of automated
tools, called "bots", that direct large numbers of compromised
computers to launch attacks through the Internet as swarms. The
growing trend toward the use of more automated attack tools has
also overwhelmed some of the current methodologies used for
tracking Internet cyberattacks. This book provides background
information for three types of attacks against computers
(cyberattack, physical attack, and electromagnetic attack), and
discusses related vulnerabilities for each type of attack. The book
also describes the possible effects of a co-ordinated cyberattack,
or computer network attack (CNA), against U.S. infrastructure
computers, along with possible technical capabilities of
international terrorists. Issues for Congress may include how could
trends in cyberattacks be measured more effectively; what is
appropriate guidance for DOD use of cyberweapons; should
cybersecurity be combined with, or remain separate from, the
physical security organization within DHS; how can commercial
vendors be encouraged to improve the security of their products;
and what are options to encourage U.S. citizens to follow better
cybersecurity practices? Appendices to this book describe computer
viruses, spyware, and "bot networks", and how malicious programs
are used to enable cybercrime and cyberespionage. Also,
similarities are drawn between planning tactics currently used by
computer hackers and those used by terrorists groups for
conventional attacks.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.