Cyberterrorism

Front Cover
The Rosen Publishing Group, Aug 15, 2010 - Juvenile Nonfiction - 64 pages
0 Reviews
Give students something to think about when they're next using their computers-the dangers of cyberterrorism. At no time in history has information been so accessible to the individual, or so vulnerable to attack by a single crafty terrorist armed with only a computer and an Internet connection. In spite of developments in encryption (protective coding), firewalls (barriers to unauthorized access), and other security systems, there is always the threat that criminals will hack through a computer network's security system, from any location in the world, no matter how remote. Is there any way to stop or prevent cyberterrorism, or are we doomed to be thrust back into the relative dark ages of the pre-digital era in the blink of an eye-or the click of a mouse?
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Introduction
4
Chapter 1 CYBERATTACKERS AND THEIR TECHNIQUES
8
WORSTCASE SCENARIOS
23
Chapter 3 HOW REAL IS THE THREAT?
33
Chapter 4 FIGHTING CYBERATTACKS AND CYBERTERRORISM
43
glossary
53
For More Information
55
For Further Reading
58
Bibliography
59
Index
62
About the Author
64
Copyright

Other editions - View all

Common terms and phrases

About the author (2010)

Jacqueline Ching is a New York-based writer and editor. Womens' Rights is her fifth book for the Rosen Publishing Group.

Bibliographic information