This report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack.
The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term.
Table of Contents
- Background and Introduction
- Types of Threats Associated with Information Technology Infrastructure
- Investing in Information Technology Research
- What Can Be Done Now?
- Rationalizing the Future Research Agenda
Download Free PDF / Read Online
Number of pages: 144