Über den Autor
Andrew Colarik has accumulated over twenty-five years experience of knowledge utilizing computer information systems. He continues to provide systems design, network administration, equipment review and selection, troubleshooting, and hands-on training of installed systems for businesses in the financial, manufacturing, and government industries. As a researcher, author, and inventor, Andrew has been published in top-tier security conferences, and is an inventor of both utility and design patents. He is the holder of a PhD in Information Systems from the University of Auckland and a Masters of Business Administration from Kent State University.
I: INTRODUCTION; II: THE POWER OF TERRORISM; III: CYBER-TERRORISM EVOLUTION; IV: GLOBAL INFORMATION INFRASTRUCTURE; V: CURRENT CYBER-ATTACK METHODS; VI: ATTACK SCENARIOS; VII: THOUGHTS FOR THE FUTURE.
Outlines many terrorist activities, political objectives, and their use of cyberspace. This book illustrates the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier.