Cyberterrorism scenarios scrutinized

Friday, 23 August 2002, 12:32 AM EST

At the inaugural SECTOR5 conference that opened in Washington, D.C., Wednesday, the talk of cyberterrorism is talk of an IT doomsday. In it, weapons of mass disruption replace weapons of mass destruction, and instead of a "dirty bomb" filled with radioactive material hitting a city, terrorists pack "logic bombs" in their bag of nasty tricks.

Conference officials kicked off the event with a dark scenario involving the New York Stock Exchange and a group of terrorists who gain access to the trading floor data center by taking temporary jobs there as IT employees. In the scenario described, the terrorists plug into open ports in the data center and use accounts issued to them as employees.

[ Read more ]




Spotlight

The context-aware security lifecycle and the cloud

Posted on 25 November 2014.  |  Ofer Wolf, CEO at Sentrix, explains the role of the context-aware security lifecycle and illustrates how the cloud is shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Nov 26th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //