Protect and survive

Research output: Contribution to journalArticlepeer-review

Abstract

Communication networks can only be protected against cyber terrorist attacks if telcos, governments and end-users work together. Cyber attacks involve the disruption, destruction or alteration of data within computer based-systems. The aims is to acquire information or temporarily disable the system. When used to disrupt telcos, tandem acts of physical terrorism may be used to heighten the chaos.
Original languageEnglish
Pages (from-to)29-31
Number of pages3
JournalTelecommunications International
Volume37
Issue number1
Publication statusPublished - 1 Jan 2003

Keywords

  • cyber crime
  • electronic attacks
  • inventory management
  • network management

Fingerprint

Dive into the research topics of 'Protect and survive'. Together they form a unique fingerprint.

Cite this