Premium Content

Access "Time to take cyberterrorism talk seriously"

Published: 22 Oct 2012

The Estonia attacks demonstrate that it takes only a few individuals to expose vulnerable civil infrastructure systems to harm. As the sixth anniversary of the Sept. 11 attacks draws near and airports are on high alert for possible "dry runs" from terrorists, the likelihood of cyberterrorism has yet again surfaced for discussion in information security circles. Some have scoffed at the assertion that cyberterrorism is a real threat today. But with the power of botnets, SCADA systems becoming less proprietary and the recent attacks on Estonia, have we reached an inflection point where we need to take this more seriously? Could we actually be engaged in an Internet war soon? Are some nation states hostile actors with the capability of conducting cyberterrorism? And how does the private sector also arm itself against such attacks? In this month's Perspectives column (see "The Lesson of Estonia"), Dorothy Denning, information security pioneer, researcher and professor of defense analysis at the Naval Postgraduate School, argues that the attacks on Estonia this ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Malware Analysis

      Norman SandBox Analyzer Pro

    • Rootkit detection and removal know-how

      Get advice on how to detect malware and rootkits and the best ways to achieve rootkit removal and prevent hacker attacks.

    • Logical, physical security integration challenges

      Integrating physical and IT security can reap considerable benefits for an organization, including enhanced efficiency and compliance plus improved security. But convergence isn't easy. Challenges include bringing the physical and IT security teams together, combining heterogenous systems, and upgrading a patchwork of physical access systems.

    • SIM and NBA product combination is powerful

      The recent announcement that Mazu Networks, a provider of network-based analysis (NBA) tools, and eIQnetworks, a supplier of SIM products, underscores the trend towards convergence in the NBA and SIM markets. The value proposition is clear: two useful network/security data analysis tools in one integrated package.

    • Virtualization

      BufferZone Enterprise

More Premium Content Accessible For Free