This is a multi-part message in MIME format. --------------3919D65DB7DFCD9A3391F338 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Way to go local boy! A very interesting article on cyberterrorism. Even though the article is aimed at businesses, home users can learn a thing or two. http://www.informit.com/content/index.asp?product_id={0A27BA59-99A8-4866-AF84-A348B7C35EB0}&news=true George --------------3919D65DB7DFCD9A3391F338 Content-Type: text/html; charset=iso-8859-1; name="index.asp" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline; filename="index.asp" Content-Base: "http://www.informit.com/content/index. asp?product_id={0A27BA59-99A8-4866- AF84-A348B7C35EB0}&news=true" Content-Location: "http://www.informit.com/content/index. asp?product_id={0A27BA59-99A8-4866- AF84-A348B7C35EB0}&news=true" InformIT.com
3D"InformIT.com"   =      
3D"MyInformIT"3D"Home" 3D"Software"3D"eLearning"3D"Free3D"Book3D"Articles"<= area shape=3D"rect" coords=3D"321,2,388,26" href=3D"/discussion/index.asp= ?session_id=3D{2970FACB-B04E-4735-A855-62296EF4A709}" target=3D"_top" alt= =3D"Discussions" title=3D"Discussions">3D"Safari"  
 
 
 InformIT Search:

Advanced Search | Help
 
 

Like this Article?
= <= tr>

= Buy this Book!
Price: $38.69<= /font>
Add t= o Cart



Secti= ons:
<= td width=3D"7">The World Changed on September 11, 2001
How Cyberterrorism Can Affect You
=
Four Horsemen of the In= fo-Apocalypse
<= td width=3D"7">
<= a class=3D"btblinks" href=3D"/content/articlex.asp?product_id=3D{0A27BA59= -99A8-4866-AF84-A348B7C35EB0}&element_id=3D{B975178E-99FE-4AD7-880A-7= 17538E79ADF}&session_id=3D{2970FACB-B04E-4735-A855-62296EF4A709}&= st=3DE7DEAE6A-9C49-4669-BEA3-8F405E69BA3D">About the Aut= hors
<= p class=3D"crumb"> Home > = Articles > = Networking > = Security > =

Save to MyInformIT
E-mail t= his to a Friend
Discuss this Article

The Dirty Dozen: The 12 Security Lapses That Make Your .Com, .Org, or = =2ENet an Unwitting Collaborator with Cyberterrorists
by <= b>Frank Fiore, Jean Francois
MAR 01= , 2002

 

3D""

Are you unintentionally supporting cyberte= rrorism? If your security isn't ultra-tight, your .com, .org, or .net sit= e just may be colluding in cyberterrorist activity. Frank Fiore and Jean = Fran=E7ois provide a checklist of questions to which you need solid, inte= lligence-safe answers.

This article is pro= vided courtesy of Sams.

The World Changed on September 11, 2001

What changed on 9/11 was the realization that we can be attacked right= here at home. And with that realization came once again the subject of info= war and its partner in crime cyberterrorism. You've heard the new= s, read the articles, and seen the movie—and it goes something like this:

It's June, the children are out of school, and as highways and= airports fill with vacationers, rolling power outages hit sections of Los= Angeles, Chicago, Washington, and New York. An airliner is mysteriously k= nocked off the flight control system and crashes in Kansas.

Parts of the 911 service in Washington fail. Supervisors at the Dep= artment of Defense discover that their email and telephone services are disrupted= =2E Officers aboard a U.S. Navy cruiser find that their computer systems have= been attacked.

As incidents mount, the stock market drops precipitously, and panic= surges through the population.

Is this "electronic Pearl Harbor" myth or reality?

Much of the scenario above—except for the plane, stock market cra= sh, and panic—actually occurred in 1997, when 35 hackers hired by the Nation= al Security Agency launched simulated attacks on the U.S. electronic infrastructure.

The exercise, called "Eligible Receiver," achieved "roo= t level" access in 36 of the Department of Defense's 40,000 netwo= rks. The simulated attack also "turned off" sections of the U.S. pow= er grid; "shut down" parts of the 911 network in Washington, D.C.,= and other cities; and gained access to systems aboard a Navy cruiser at sea. = The results of the exercise confirmed that in a software-driven world, an ene= my need not invade the territory—or the air above the territory—of a co= untry to control or damage that country's resources.


Next = Section -- "How Cyberterrorism Can Affect You"



Be the First to make a Comment!

Ever get picked last in gym class? This i= s your chance to be first! Make your mark and be the first to make a com= ment!!
 Make a comment
<= /td>

Related Materials

Articles

Books

eLearning



       
&= nbsp;
 

About Us |  Advertise= On InformIT |  Contact U= s |  Legal Notice |  Privacy Poli= cy 3D"TRUSTe"

© 2002 Pearson E= ducation, Inc. InformIT Division. All rights reserved. 201 Wes= t 103rd Street, Indianapolis, IN 46290

 
--------------3919D65DB7DFCD9A3391F338--