Abstract
Communication networks can only be protected against cyber terrorist attacks if telcos, governments and end-users work together. Cyber attacks involve the disruption, destruction or alteration of data within computer based-systems. The aims is to acquire information or temporarily disable the system. When used to disrupt telcos, tandem acts of physical terrorism may be used to heighten the chaos.
| Original language | English |
|---|---|
| Pages (from-to) | 29-31 |
| Number of pages | 3 |
| Journal | Telecommunications International |
| Volume | 37 |
| Issue number | 1 |
| Publication status | Published - 1 Jan 2003 |
Keywords
- cyber crime
- electronic attacks
- inventory management
- network management
Fingerprint
Dive into the research topics of 'Protect and survive'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver