Table of contentsThe Structure of Information Protection
Outline
My Jobs
UNH
Studies in Cyber Terrorism
Summary of studies
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
More on Means
Slide 13
Slide 14
Other target criteria
Non infrastructure targets
Slide 17
Slide 18
Slide 19
Slide 20
Slide 21
Slide 22
Slide 23
Slide 24
Slide 25
Slide 26
Slide 27
Slide 28
Slide 29
Slide 30
Recent RipTech Study
Dartmouth Study
But - they don't agree
Some details of methodology
Motive varries group to group
Opportunities
Opportunities can be made
Other uses of IT
More IT for Terror
Going after enemy infrastructures
Money, influence, and support
Careful about mixing
What to do
National Security Program
NS program overview
Thank You!
|
Author: Fred Cohen
E-mail: fc@all.net
Best viewed with
|