did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780309087360

Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities

by ; ; ;
  • ISBN13:

    9780309087360

  • ISBN10:

    0309087368

  • Format: Paperback
  • Copyright: 2003-03-01
  • Publisher: Natl Academy Pr
  • Purchase Benefits
List Price: $32.00

Summary

Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on an IT system or used one as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

Table of Contents

EXECUTIVE SUMMARY 1(9)
1 BACKGROUND AND INTRODUCTION 10(5)
1.1 What Is Terrorism?,
10(1)
1.2 The Role of Information Technology in National Life and in Counterterrorism,
11(4)
1.3 The Information Technology Infrastructure and Associated Risks,
l2
2 TYPES OF THREATS ASSOCIATED WITH INFORMATION TECHNOLOGY INFRASTRUCTURE 15(13)
2.1 Attack on IT as an Amplifier of a Physical Attack,
l5
2.2 Other Possibilities for Attack Involving IT,
16(7)
2.2.1 Attacks on the Internet,
l6
2.2.2 Attacks on the Public Switched Network,
l8
2.2.3 The Financial System,
20(1)
2.2.4 Embedded/Real-Time Computing,
20(1)
2.2.5 Control Systems in the National Critical Infrastructure,
21(2)
2.2.6 Dedicated Computing Facilities,
23(1)
2.3 Disproportionate Impacts,
23(1)
2.4 Threats in Perspective: Possibility, Likelihood, and Impact,
24(4)
3 INVESTING IN INFORMATION TECHNOLOGY RESEARCH 28(69)
3.1 Information and Network Security,
31(15)
3.1.1 Authentication,
33(2)
3.1.2 Detection,
35(2)
3.1.3 Containment,
37(3)
3.1.4 Recovery,
40(1)
3.1.5 Cross-cutting Issues in Information and Network Security Research,
41(5)
3.2 Systems for Emergency Response,
46(17)
3.2.1 Intra- and Interoperability,
47(8)
3.2.2 Emergency Deployment of Communications Capacity,
55(2)
3.2.3 Security of Rapidly Deployed Ad Hoc Networks,
57(1)
3.2.4 Information-Management and Decision-Support Tools,
58(1)
3.2.5 Communications with the Public During an Emergency,
59(1)
3.2.6 Emergency Sensor Deployment,
60(1)
3.2.7 Precise Location Identification,
61(1)
3.2.8 Mapping the Physical Aspects of the Telecommunications Infrastructure,
62(1)
3.2.9 Characterizing the Functionality of Regional Networks for Emergency Responders,
62(1)
3.3 Information Fusion,
63(8)
3.3.1 Data Mining,
68(1)
3.3.2 Data Interoperability,
69(1)
3.3.3 Natural Language Technologies,
69(1)
3.3.4 Image and Video Processing,
70(1)
3.3.5 Evidence Combination,
70(1)
3.3.6 Interaction and Visualization,
71(1)
3.4 Privacy and Confidentiality,
71(4)
3.5 Other Important Technology Areas,
75(5)
3.5.1 Robotics,
75(1)
3.5.2 Sensors,
76(2)
3.5.3 Simulation and Modeling,
78(2)
3.6 People and Organizations,
80(17)
3.6.1 Principles of Human-Centered Design,
81(8)
3.6.2 Organizational Practices in IT-Enabled Companies and Agencies,
89(2)
3.6.3 Dealing with Organizational Resistance to Interagency Cooperation,
91(2)
3.6.4 Principles into Practice,
93(2)
3.6.5 Implications for Research,
95(2)
4 WHAT CAN BE DONE NOW? 97(9)
5 RATIONALIZING THE FUTURE RESEARCH AGENDA 106(9)
APPENDIX: BIOGRAPHIES OF COMMITTEE AND STAFF MEMBERS 115(12)
WHAT IS CSTB? 127

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program