Sponsored by ComputerWeekly.com
Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats? Access >>>
Table of contents
- Structured terrorist groups
- Using the web for terrorist activity
- Defining cyber terrorism
Premium Content for Free.
More Premium Content Accessible For Free
Memory corruption attacks
Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A ...
Tactics to combat insider threat
This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a ...
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.