Skip to main content

Currently Skimming:

Cyberattacks as an Amplifier in Terrorist Strategy
Pages 93-96

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 93...
... This multifaceted character of IT is unique among the technologies of concern to the counterterrorist. As a target, not only the telecommunications and data network infrastructures might be subject to a cyberattack, but so might all of the other areas of critical infrastructure whose efficient functioning depends on computer controls, data management, and digital communications.
From page 94...
... Ignatyev · attacks that benefit from a corrupted insider, especially one with access to systems management · attacks on soft but important targets such as the Internet; one example is attacks on root name servers, but since these files are replicated on other name servers, all must be successfully attacked The National Academies study Making the Nation Safer: The Role of Science and Technology in Countering Terrorism concluded that most communications systems, while vulnerable to attack, are also resilient and can in most cases be brought back into service in a relatively short time.1 Thus, cyberwarfare is not considered a weapon of mass destruction. However, cybertechnology is accessible to terrorists; it is ubiquitous in target systems, critical to their proper functioning, and attacks can be deployed covertly from anywhere.
From page 95...
... Among them are the following: · ensure secure and interconnected communications among first responders and crisis managers · develop and apply methods for high-reliability authentication of security messages · develop ways to ensure that critical networks degrade slowly and reversibly when attacked · devise systems for acquiring a snapshot of system state and preserve the most critical data in critical large systems under attack, to allow them to be recovered in most important respects as quickly as possible Some longer-range research tasks were to · develop telecommunications system software so that limited service will continue when in a volume-saturated state · design self-adaptive networks that reconfigure automatically when attacked · address the security needs of mobile wireless communications · create better decision support tools for crisis managers · address the security flaws in operating systems and network software Underlying these practical research objectives is the need, at least in the United States, for expanded investments in basic research and advanced research education to address the general lack of strong security in computer operating systems and network software.
From page 96...
... Available online in PDF at: http://books.nap.edu/ html/stct/index.html. Hard copies may be ordered from National Academies Press at: (888)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.