What InfoSec professionals should know about information warfare tactics by terrorists

被引:4
|
作者
Kovacich, GL [1 ]
Jones, A [1 ]
机构
[1] QinetiQ, Secure Informat E Business Syst, Malvern, Worcs, England
关键词
Algorithms - Cryptography - Data communication systems - Electronic mail - Military data processing - Military electronic countermeasures - Ordnance - Societies and institutions;
D O I
10.1016/S0167-4048(02)00203-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The first part of this article (Computers & Security, Vol. 21, No. 1) defined terrorism and the aims of terrorists. Part I also discussed different tactics which may be employed to hide data from governments and official agencies including steganography. The second part of the article considers other methods of data hiding as well as the different types of attack which may be used by terrorists. Finally it offers advice to information security professionals looking to counter the affects of such terrorist actions.
引用
收藏
页码:113 / 119
页数:7
相关论文
共 50 条