Title :
Help for cyberterrorism: Y2K´s silver lining
Author_Institution :
Inf. Technol. Agency, Los Angeles, CA, USA
Abstract :
We have seen numerous concerted efforts to deal with worldwide problems that potentially affected everyone, such as world wars and health hazards. We are now witnessing a different kind of global mobilization to conquer the Y2K problem. To remedy the Y2K problem, IT departments throughout the world have had to direct enormous resources to perform an in-depth analysis of their computers. We have inventoried software, hardware, and applications; fixed code; replaced noncompliant components and embedded chips; and developed contingency plans. Contingency planning is a major endeavor to ensure continuity of operations even if Y2K bugs persist and cause a system failure. In all this planning is 1st January 2000 the ideal time for a terrorist to strike? So now, as we turn the corner on Y2K, I believe we need to focus on this other large problem: terrorism through cyberspace-cyberterrorism. I consider cyberterrorism to be the use of information technology to disrupt critical infrastructure. Y2K can pay dividends by helping us to protect that infrastructure
Keywords :
DP management; computer crime; data integrity; database management systems; planning; contingency planning; critical infrastructure protection; cyberterrorism; year 2000 problem; Application software; Computer bugs; Embedded software; Hardware; Hazards; Information technology; Military computing; Performance analysis; Silver; Terrorism;
Journal_Title :
IT Professional
DOI :
10.1109/6294.774797