![]() ![]() Nuclear Regulatory Commission Draft Regulatory Guide DG-1130, “Criteria for Use of Computers in Safety Systems of Nuclear Power Plants,” remote connectivity is directly addressed. For instance, many have realized that interconnectivity, although convenient, is not necessarily a good idea. ![]() Industries may have proactively implemented practices to minimize such attacks. This lends some credibility to the belief that the cyberterrorist threat has been blown out of proportion. They were all aware of numerous hacking attacks, but none were aware of any cyberterrorist attacks or investigations. I conducted an informal survey with the promise of anonymity, asking if any of them was aware of true cyberterrorist attacks or investigations. I have several friends who are cybercrime investigators for various law enforcement agencies. Are these real threats, or is the cyberterrorist just another bogeyman? ![]() Individuals have proposed numerous cyberterror scenarios, such as hacking into the control systems of a hydroelectric dam and releasing a flood on downstream communities, and hacking into air traffic control systems to cause the crash of a passenger jet. It refers to a politically motivated, computer-based attack that is designed to cause a catastrophic event resulting in physical harm, death and fear among a large population base. It's not surprising there's no consensus, considering that many people don't even have a clear understanding of the term cyberterrorism. Immediately after 9/11, the public media and the industry seemed to consider it a high-stakes issue, but as time passed the tone of most articles reflected that the threat was being blown out of proportion. Pundits, the media, security directors and politicians disagree on the significance of the cyberterrorism threat. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |