Information technology for counterterrorism : immediate actions and future possibilities / Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors.

By: National Research Council (U.S.). Committee on the Role of Information Technology in Responding to Terrorism
Contributor(s): Hennessy, John L | Patterson, David A | Lin, Herbert
Material type: TextTextPublisher: Washington, D.C. : National Academies Press, ©2003Description: 1 online resource (xv, 128 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 0309504341; 9780309504348Subject(s): Terrorism -- Prevention | Information technology -- United States | Computer security -- United States | Computer networks -- Security measures -- United States | Telecommunication systems -- United States | POLITICAL SCIENCE -- Political Freedom & Security -- Law Enforcement | Computer networks -- Security measures | Computer security | Information technology | Telecommunication systems | Terrorism -- Prevention | United States | Humaniora Historie | Samfundsvidenskab PolitologiGenre/Form: Electronic books. | Electronic books. Additional physical formats: Information technology for counterterrorism.DDC classification: 364.142 LOC classification: HV6432 | .N384 2003bOnline resources: Click here to access online
Contents:
Front Matter -- Preface -- Acknowledgment of Reviewers -- Contents -- EXECUTIVE SUMMARY -- 1 BACKGROUND AND INTRODUCTION -- 2 TYPES OF THREATS ASSOCIATED WITH INFORMATION TECHNOLOGY INFRASTRUCTURE -- 3 INVESTING IN INFORMATION TECHNOLOGY RESEARCH -- 4 WHAT CAN BE DONE NOW? -- 5 RATIONALIZING THE FUTURE RESEARCH AGENDA -- APPENDIX: BIOGRAPHIES OF COMMITTEE AND STAFF MEMBERS -- WHAT IS CSTB?
Summary: Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references.

Chairman: John Hennessy.

Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

Print version record.

Front Matter -- Preface -- Acknowledgment of Reviewers -- Contents -- EXECUTIVE SUMMARY -- 1 BACKGROUND AND INTRODUCTION -- 2 TYPES OF THREATS ASSOCIATED WITH INFORMATION TECHNOLOGY INFRASTRUCTURE -- 3 INVESTING IN INFORMATION TECHNOLOGY RESEARCH -- 4 WHAT CAN BE DONE NOW? -- 5 RATIONALIZING THE FUTURE RESEARCH AGENDA -- APPENDIX: BIOGRAPHIES OF COMMITTEE AND STAFF MEMBERS -- WHAT IS CSTB?

English.

There are no comments for this item.

to post a comment.

Powered by Koha