This report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack.
Book Description
The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term.
Table of Contents
- Background and Introduction
- Types of Threats Associated with Information Technology Infrastructure
- Investing in Information Technology Research
- What Can Be Done Now?
- Rationalizing the Future Research Agenda
Download Free PDF / Read Online
Author(s): John L. Hennessy, David A. Patterson, and Herbert S. Lin
Format(s): PDF
Number of pages: 144
Link: Download.
Format(s): PDF
Number of pages: 144
Link: Download.