Research on the Cyber Terrorist Attacks and its Impacts on Information Infrastructure Security

Article Preview

Abstract:

With technology advances, the interdependence of various infrastructures has increased, which enhances their vulnerabilities. The national information infrastructure security concerns the nation's stability and economic security. Risk assessment methodology was introduced into the safeguard of the information infrastructure, which is prone to terrorist attack. Through the analysis of terrorists’ behaviors and its characteristics, the four steps of risk management were studied in detail using many factual examples. The macroscopic and microscopic countermeasures were developed lately, which attribute to adopting counteractions to reduce the vulnerability and relieve the risk in the modern society caused by terrorist attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

2108-2115

Citation:

Online since:

July 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Bonnaccorsi: On the Relationship between Firm Size and Export Intensity, Journal of International Business Studies(1992), XXIII (4), pp.605-635.

Google Scholar

[2] Colarik, Andrew M: Cyber Terrorism: Political and Economic Implications. Idea Group, U.S. ISBN 1-59904-022-0, (2006).

Google Scholar

[3] http: /www. dawn. com/weekly/dmag/archive/020616/dmag21. htm. Retrieved 2008-08-30.

Google Scholar

[4] R. Caves. Multinational Enterprise and Economic Analysis, Cambridge University Press, (1982).

Google Scholar

[5] Weimann, Gabriel. Terror on the Internet: The New Arena, the New Challenges. United States Institute of Peace U.S. ISBN 1-929223-71-4, (2006).

Google Scholar

[6] M. Clerc, M: Towards a Deterministic and Adaptive Particle Swarm Optimization, in Proceedings of the IEEE Congress on Evolutionary Computation (CEC), pp.1951-1957, (1999).

DOI: 10.1109/cec.1999.785513

Google Scholar

[7] Yacov Y. Haimes. The role of the society for risk analysis in the emerging threats to Critical Infrastructures [J]. Risk Analysis, Vol. 19, No. 2, pp.153-157, (1999).

DOI: 10.1111/j.1539-6924.1999.tb00396.x

Google Scholar

[8] http: /www. 9-11commission. gov/archive/hearing7/9-11Commission_Hearing_2004-01-27. htm.

Google Scholar

[9] White House. Strengthening Intelligence to Better Protect America . Fact sheet, Washington, D. C , January 28, (2003).

Google Scholar

[10] Tendler,S. Ulster security details posed on the Internet, The Times, UK 25 March (1996).

Google Scholar

[11] Malik,I. Computer Hacking: detection and protection. Sigma Press, UK. (1996).

Google Scholar