Critical Infrastructure Threats and Terrorism

From Cybersecurity Wiki
Revision as of 16:54, 16 June 2010 by <bdi>WikiSysop</bdi> (talk | contribs) (New page: ==Full Title of Reference== Cyber Operations and Cyber Terrorism: Handbook No. 1.02 ==Full Citation== Deputy Chief of Staff for Intelligence, ''Cyber Operations and Cyber Terrorism: Ha...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Full Title of Reference

Cyber Operations and Cyber Terrorism: Handbook No. 1.02

Full Citation

Deputy Chief of Staff for Intelligence, Cyber Operations and Cyber Terrorism: Handbook No. 1.02, (2009). Web AltWeb

BibTeX

Categorization

Key Words

Cyber Terrorism, Cyber Warfare, DDoS Attack, Hacker, Keylogger, Malware

Synopsis

This informational document supplements the basic terrorism handbook and supports operational missions, institutional training, and professional military education for U.S. military forces in the Global War on Terrorism (GWOT). This document provides an introduction to Cyber Terrorism, and addresses the history of the phenomena, how terrorist organizations recruit, the motivations behind use of the tactic, characteristics of Cyber Terrorism, and the types of attacks against networks. Finally, the handbook addresses specific threats to military forces.

Additional Notes and Highlights

This handbook contains a useful glossary of cyber terrorism and cyber crime terms.