Information Technology for Counterterrorism:: Immediate Actions and Future Possibilities
Committee on the Role of Information Technology in Responding to Terrorism, National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board
National Academies Press, Mar 7, 2003 - Computers - 144 pages
Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Background and Introduction
12 THE ROLE OF INFORMATION TECHNOLOGY IN NATIONAL LIFE AND IN COUNTERTERRORISM
13 THE INFORMATION TECHNOLOGY INFRASTRUCTURE AND ASSOCIATED RISKS
Types of Threats Associated with Information Technology Infrastructure
22 OTHER POSSIBILITIES FOR ATTACK INVOLVING IT
222 Attacks on the Public Switched Network
223 The Financial System
225 Control Systems in the National Critical Infrastructure
326 Emergency Sensor Deployment
327 Precise Location Identification
328 Mapping the Physical Aspects of the Telecommunications Infrastructure
33 INFORMATION FUSION
331 Data Mining
332 Data Interoperability
334 Image and Video Processing
336 Interaction and Visualization
226 Dedicated Computing Facilities
POSSIBILITY LIKELIHOOD AND IMPACT
Investing in Information Technology Research
31 INFORMATION AND NETWORK SECURITY
315 Crosscutting Issues in Information and Network Security Research
32 SYSTEMS FOR EMERGENCY RESPONSE
321 Intra and Interoperability
322 Emergency Deployment of Communications Capacity
323 Security of Rapidly Deployed Ad Hoc Networks
324 Information Management and DecisionSupport Tools
325 Communications with the Public During an Emergency
35 OTHER IMPORTANT TECHNOLOGY AREAS
353 Simulation and Modeling
36 PEOPLE AND ORGANIZATIONS
361 Principles of HumanCentered Design
362 Organizational Practices in ITEnabled Companies and Agencies
363 Dealing with Organizational Resistance to Interagency Cooperation
364 Principles into Practice
365 Implications for Research
What Can Be Done Now?
Rationalizing the Future Research Agenda
Biographies of Committee and Staff Members
What Is CSTB?
authentication Available online behavior BRUCE CROFT building C3I systems Carnegie Mellon University challenge Computer Science computer security computer system Computing and Communications context counterterrorism Crisis Management CSTB cybercrime Cybersecurity Today damage data mining deployed deployment detect disaster efforts emergency responders emergency-response agencies Engineering environment example federal firefighters functionality graceful degradation human impact individual information and network information fusion Information Technology Research intelligence interagency cooperation Internet interoperability Intrusion-detection systems issues member of CSTB models multiple National Academy Press National Research Council network security operational organizational passwords personnel physical potential problems relevant require Research for Crisis Research is needed research program response result robots SCADA Science and Telecommunications sensors STEVEN WOO systems and networks target Telecommunications Board terrorism terrorist terrorist attack threat tion Trust in Cyberspace University users vulnerabilities Washington wireless
Page v - JOHN M. CIOFFI, Stanford University ELAINE COHEN, University of Utah W. BRUCE CROFT, University of Massachusetts at Amherst THOMAS E.
Page v - MARGARET HUYNH, Senior Project Assistant DAVID DRAKE, Senior Project Assistant JANICE SABUDA, Senior Project Assistant JENNIFER BISHOP, Senior Project Assistant BRANDYE WILLIAMS, Staff Assistant For more information on CSTB, see its Web site at <http://www.