Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Information technology for counterterrorism [electronic resource] : immediate actions and future possibilities / Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies ; John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors.

By: National Research Council (U.S.). Committee on the Role of Information Technology in Responding to Terrorism.
Contributor(s): Hennessy, John L | Patterson, David A | Lin, Herbert.
Material type: TextTextPublisher: Washington, D.C. : National Academies Press, c2003Description: 1 online resource (xv, 128 p.).ISBN: 0309504341 (electronic bk.); 9780309504348 (electronic bk.).Subject(s): Terrorism -- Prevention | Information technology -- United States | Computer security -- United States | Computer networks -- Security measures -- United States | Telecommunication systems -- United States | POLITICAL SCIENCE -- Political Freedom & Security -- Law Enforcement | Electronic books | Humaniora Historie | Samfundsvidenskab PolitologiGenre/Form: Electronic books.Additional physical formats: Information technology for counterterrorism.DDC classification: 364.142 Online resources: ebrary | EBSCOhost | Google | MyiLibrary | National Academies Press Summary: Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references.

Chairman: John Hennessy.

Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Information technology for counterterrorism ©2003
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter