𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Compsec — Network Security and Disaster Survival


Book ID
104391751
Publisher
Elsevier Science
Year
2002
Tongue
English
Weight
156 KB
Volume
2002
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


The keynote agenda for Compsec 2002 reflects the newly transformed security landscape with the compounding damage from 11 September and the menacing threat of cyberwar.

Cyberwar

Brian Jenkins, senior advisor to the president of the RAND Corporation and advisor to the International Chamber of Commerce, is one of the top five terrorist analysts in the world. Jenkins delivers a chilling keynote on the current threat of international terrorism. To start Brian Jenkins tackles the big question -can we expect calculated and catastrophic cyberterrorism? We have heard speculation about cyber-attacks and witnessed violent variations in network traffic but nothing that can be classified as cyberwar. Jenkins says that what worries him the most is a combined attack involving a physical strike with a coordinated cyber-attack. He indicated the three-way multi-dimensional attack that ran simultaneously with 11 September. Corporations and government departments were facing Anthrax scares, Code Red and the backlash from 11 September all at once. Jenkins told Network Security that "We now know that the anthrax scare and the Code Red virus were unrelated to 11 September but this leaves us with the worry that such a combination of different attack strategies could pose a significant threat".

Jenkins believes that "Al-Quaeda were not fully aware of the cascading economic effects that the 11 September attacks would have". He asserts that "their intentions were to bring down tall buildings, strike the symbol of the US military -the Pentagon and kill as many civilians as possible". He is worried that after terrorists have observed


📜 SIMILAR VOLUMES


Network and System Security || Internet
✍ Walker, Jesse 📂 Article 📅 2014 🏛 Elsevier 🌐 English ⚖ 240 KB

*Network and System Security* provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the