Assessing Terrorist Cyber Threats: Engineering a Functional Construct
Description:
Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool w…
more
Date:
December 2014
Creator:
Morgan, Deanne