iSecurity Summit BAQ
Information warfare: Cyber terrorism and common tactics for easily breaking sociopolitical conditions
The future of Cyberterrorism's threats has just begun. While cyber-defenders face a whole range of security vulnerabilities daily, terrorists must only exploit a vulnerability to fulfill their mission. Cyberterrorism's tactics are no longer limited to monitoring and data acquisition systems (SCADA), with reasons to damage the integrity of critical infrastructures such as water supply, electrical networks, transport systems and systems Financial. In a world where terrorism and cyberspace unite to intimidate or coerce people in support of political and social goals, next-generation tactics are more subtle and easier to execute.