Cyberterrorism

Presented at Notacon 2 (2005), April 8, 2005, 5 p.m. (60 minutes).

After the September 11th attacks, the U.S. government has systematically instituted programs to provide information analysis and infrastructure protection from terrorist attacks. One area of concern is the use of cyber space by terrorists to communicate, coordinate activities between terrorist cells, gather intelligence on potential targets, and disrupt and/or disable computer networks as a force multiplier just prior to a physical attack. While this may seem like cyber punk, it is a growing domain that impacts the hacker community. What this talk will present is a foundational understanding of cyber terrorism and the government's initiatives that are changing the way people are being held accountable for the use of computer systems and system intrusions.


Presenters:

  • Andrew Colarik
    Andrew Colarik has a thorough knowledge of the foundations, architectures, and protocols of computer and Internet fundamentals and their associated vulnerabilities. With over twenty-three (23) years utilizing computerized information systems, Andrew has and continues to provide simple, step by step explanations of the risks businesses face and how to protect systems from computer attacks. Andrew Colarik was awarded a Ph.D. in Information Systems (Security), and is the holder of a Masters in Business Administration (MIS). The combination of his credentials with over eight years of college level teaching, providing training seminars to legal and law enforcement professionals, and over eight years as an independent consultant brings a well balanced insight on key security issues facing organizations today. As a researcher, author, and inventor, Andrew has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents. The latest of these publications by Andrew include: Managerial Guide for Handling Cyber-Terrorism and Information Warfare (January 2005), The Home Executive's Guide To Computer Security (November 2004), Update/Patch Management Systems: A protocol taxonomy with security implications (August 2004), World Framework for Security Benchmark Changes (May 2003), and An Integrity Mechanism for File Transfer in Communication Networks (May 2003).

Links:

Similar Presentations: