Information technology (IT) is essential to virtually all of the nation’s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation’s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
Table of Contents |
skim chapter | |
---|---|---|
Front Matter | i-xvi | |
Executive Summary | 1-9 | |
1 Background and Introduction | 10-14 | |
2 Types of Threats Associated with Information Technology Infrastructure | 15-27 | |
3 Investing in Information Technology Research | 28-96 | |
4 What Can Be Done Now? | 97-105 | |
5 Rationalizing the Future Research Agenda | 106-114 | |
Appendix: Biographies of Committee and Staff Members | 115-126 | |
What is CSTB? | 127-128 |
The National Academies Press and the Transportation Research Board have partnered with Copyright Clearance Center to offer a variety of options for reusing our content. You may request permission to:
For most Academic and Educational uses no royalties will be charged although you are required to obtain a license and comply with the license terms and conditions.
For information on how to request permission to translate our work and for any other rights related query please click here.
For questions about using the Copyright.com service, please contact:
Copyright Clearance Center
22 Rosewood Drive
Danvers, MA 01923
Tel (toll free): 855/239-3415 (select option 1)
E-mail: info@copyright.com
Web: https://www.copyright.com
Loading stats for Information Technology for Counterterrorism: Immediate Actions and Future Possibilities...