Information Technology for Counterterrorism: Immediate Actions and Future PossibilitiesInformation technology (IT) is essential to virtually all of the nation’s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation’s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks. |
Other editions - View all
Common terms and phrases
addition authentication Available online behavior BRUCE CROFT building Carnegie Mellon University challenge Computer Science computer security computer system Computing and Communications context counterterrorism Crisis Management CSTB cybercrime Cybersecurity Today damage data mining deployed deployment detect disaster effective efforts emergency responders emergency-response agencies Engineering environment example federal Fire Department firefighters functionality graceful degradation human impact individual information and network information fusion Information Technology Research intelligence Internet interoperability Intrusion-detection systems issues member of CSTB models multiple National Academy Press National Research Council network security operational organizational passwords personnel physical potential problems protocols relevant require Research for Crisis Research is needed research program response result robots SCADA Science and Telecommunications sensors STEVEN WOO systems and networks target Telecommunications Board terrorism terrorist terrorist attack threat tion Trust in Cyberspace University users vulnerabilities Washington wireless