Issues in Cyber Terrorism


Click here to start

Table of contents

The Structure of Information Protection

Outline

My Jobs

UNH

Studies in Cyber Terrorism

Summary of studies

Slide 7

Slide 8

Slide 9

Slide 10

Slide 11

More on Means

Slide 13

Slide 14

Other target criteria

Non infrastructure targets

Slide 17

Slide 18

Slide 19

Slide 20

Slide 21

Slide 22

Slide 23

Slide 24

Slide 25

Slide 26

Slide 27

Slide 28

Slide 29

Slide 30

Recent RipTech Study

Dartmouth Study

But - they don't agree

Some details of methodology

Motive varries group to group

Opportunities

Opportunities can be made

Other uses of IT

More IT for Terror

Going after enemy infrastructures

Money, influence, and support

Careful about mixing

What to do

National Security Program

NS program overview

Thank You!

Author: Fred Cohen

E-mail: fc@all.net

Best viewed with
StarOffice