Information technology for counterterrorism : immediate by National Research Council, Division on Engineering and

By National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on the Role of Information Technology in Responding to Terrorism, Herbert S. Lin, Visit Amazon's David A. Patterson Page, se

Information know-how (IT) is key to almost the entire nation’s severe infrastructures making them susceptible by means of a terrorist assault on their IT approach. An assault should be at the method itself or use the IT approach to release or exacerbate one other kind of assault. it could even be used as a counterterrorism device. The document concludes that the main devastating effects of a terrorist assault could take place if it have been on or used IT as a part of a broader assault. The document provides tips about what could be performed within the brief time period to guard the nation’s communications and knowledge structures and several other techniques approximately what will be performed over the long term. The record additionally notes the significance of contemplating how an IT method could be deployed to maximise safety opposed to and value in responding to attacks.

Show description

Read or Download Information technology for counterterrorism : immediate actions and future possibilities PDF

Similar political freedom books

Democracy, Human Rights and Law in Islamic Thought

Mohammad Abed al-Jabri is without doubt one of the so much influential political philosophers within the modern heart East. A severe rationalist within the culture of Avincenna and Averroes, he emphasizes the certain political and cultural background of the Arab international whereas rejecting the philosophical discourses which were used to vague its democratic deficit.

The Emergence of Indigenous Peoples

This can be the second one a part of a trilogy released within the Springer Briefs on Pioneers in technological know-how and perform at the celebration of the eightieth birthday of Rodolfo Stavenhagen, a individual Mexican sociologist and professor emeritus of El Colegio de Mexico. Rodolfo Stavenhagen wrote this selection of six essays at the Emergence of Indigenous Peoples among 1965 and 2009.

From Bin Laden to Facebook: 10 Days of Abduction, 10 Years of Terrorism

The 2 such a lot sought after terrorists in Southeast Asia -- a Malaysian and a Singaporean -- are at the run within the Philippines, yet they be ready to preserve their family and friends up to date on fb. Filipinos hook up with al-Qaeda-linked teams in Somalia and Yemen. The black flag -- embedded in al-Qaeda lore -- pops up on web pages and fb pages from worldwide, together with the Philippines, Indonesia, the center East, Afghanistan, Australia, and North Africa.

Mediated Citizenship: The Informal Politics of Speaking for Citizens in the Global South

Drawing on case reviews from the worldwide South, this e-book explores the politics of mediated citizenship during which voters are represented to the kingdom via 3rd social gathering intermediaries. The reports express that mediation is either commonly practiced and multi-directional and that it has a tremendous position to play in deepening democracy within the international South.

Extra resources for Information technology for counterterrorism : immediate actions and future possibilities

Sample text

Complex rather than simple targets are desirable because of the likelihood that the failure modes of a complex target are usually not 12National Research Council. 2002. Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. C. TYPES OF THREATS ASSOCIATED WITH IT INFRASTRUCTURE 25 well understood by its designers, and thus there are many more ways in which failure can occur in such systems. • Attacks that require insider access are more difficult to carry out and thus less likely to occur than attacks that do not.

Thus, they are likely to concentrate their efforts where the impact is largest for the smallest expenditure of resources. Many factors would play into a terrorist decision to use one kind of attack or another. The particular kinds of expertise and level of resources available, the effect that the terrorists wished to produce, the publicity they wished to gain, the complexity of any attack contemplated, the symbolic value of an attack, the risk of being caught, the likelihood of survival, the defenses that would be faced if a given attack was mounted, and the international reaction to such an attack are all relevant to such a decision.

For example, a constant barrage of computer viruses has been designed to attack the weaknesses of the Windows operating system and its associated browser and office productivity programs. However, these viruses have had a negligible direct effect on computers running other operating systems. Furthermore, while these attacks can be propagated through computer servers running other operating systems, they are not propagated on these systems. A monoculture is highly vulnerable to attacks because once a successful attack on the underlying system is developed, it can be multiplied at extremely low cost.

Download PDF sample

Information technology for counterterrorism : immediate by National Research Council, Division on Engineering and
Rated 4.62 of 5 – based on 8 votes