Abstract
Communication networks can only be protected against cyber terrorist attacks if telcos, governments and end-users work together. Cyber attacks involve the disruption, destruction or alteration of data within computer based-systems. The aims is to acquire information or temporarily disable the system. When used to disrupt telcos, tandem acts of physical terrorism may be used to heighten the chaos.
Original language | English |
---|---|
Pages (from-to) | 29-31 |
Number of pages | 3 |
Journal | Telecommunications International |
Volume | 37 |
Issue number | 1 |
Publication status | Published - 1 Jan 2003 |
Keywords
- cyber crime
- electronic attacks
- inventory management
- network management