Fanatics with laptops: the coming cyber war

Friday, 17 May 2002, 12:12 PM EST

Any country that can scrape together the price of a computer manual and that has a basic understanding of information systems infrastructure can train and motivate a misguided 'patriot.'

The blossoming of the Internet and its universal adoption have reinforced a trend toward interdependence of the world's political, economic and social systems.

That increasing interdependence, however, becomes frightening when one considers that a next-generation cyber terrorist will likely not represent an aggressive world power.

In terms of present-day vulnerability, such a terrorist could simply be a lone fanatic wielding a laptop. And the damage could be staggering.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //