(showing 1-10 of 12)
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation. Dorothy Denning#Attack 84
Dorothy Denning#Attack 84
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons. Dorothy Denning#Achieving 69
Dorothy Denning#Achieving 69
While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality. Dorothy Denning#Cyber 61
Dorothy Denning#Cyber 61
I think most organizations have an interest in key recovery, at least with respect to stored data. Dorothy Denning#Data 59
Dorothy Denning#Data 59
While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm. Dorothy Denning#Attack 58
Dorothy Denning#Attack 58
We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders. Dorothy Denning#Able 45
Dorothy Denning#Able 45
I prefer leaving things to the market as much as possible. Dorothy Denning#Leaving 41
Dorothy Denning#Leaving 41
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. Dorothy Denning#Digital 35
Dorothy Denning#Digital 35
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access. Dorothy Denning#Access 34
Dorothy Denning#Access 34
Everyone is a proponent of strong encryption. Dorothy Denning#Encryption 15
Dorothy Denning#Encryption 15
Forgotten your password?
New to AllAuthor.
Already have an account.