Friday, July 9, 2010
CYBER-TERRORISM,LOGIC BOMBS AND PROTECTION METHODS
By:Abbas Saghali
Hacking into computer system of a police station or a hospital and changing an individual's prescription to a lethal dosage for different motivation such as revenge can be viewed as some examples of Cyber-terrorism.In order to better protection of computer system, computing experts should be sufficiently aware of their weakness area against professional hackers which attack to systems in terms of Cyber-terrorism.It should be suggested that a complete secure system can never be accessed by any experts,but danger of Cyber-terrorism can be reduced.For instance,most of government economical and political classified documents are kept in separate systems without any connection to outside. Another way to prevention of Cyber-terrorism is promotion the use of firewall to monitor all communication in a system such as email messages which may unpredictably carry logic bombs.At the end , we should point out encryption which is the most common method of protection from Cyber-based attacks.
Cyber-terrorism Links
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment