Hostname: page-component-cd9895bd7-fscjk Total loading time: 0 Render date: 2024-12-23T19:05:55.111Z Has data issue: false hasContentIssue false

Health Implications of Cyber-Terrorism

Published online by Cambridge University Press:  28 June 2012

A. Clem
Affiliation:
Department of Environmental and Occupational Health, College of Public Health, University of South Florida, Tampa, Florida, USA
Sagar Galwankar*
Affiliation:
Assistant Professor of Medicine, Division of Infectious Diseases, Department of Internal Medicine, College of Medicine, University of South Florida, Tampa, Florida, USA
George Buck
Affiliation:
Associate Professor of Environmental and Occupational Health, College of Public Health, University of South Florida, Tampa, Florida
*
193, Mountain View Drive, Clifton, NJ 07013 USA, E-mail: [email protected]

Abstract

The world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.

Type
Special Report
Copyright
Copyright © World Association for Disaster and Emergency Medicine 2003

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1.Rattray, G J: Chapter 5. The cyber-terrorism threat. Available at www.secu-rityunit.com/asale/inss/terrchp5.html. Accessed 25 June 2003.Google Scholar
2.Denning, DE: Cyber-terrorism (2000). Available at www.cs.georgetown.edu/~denning/infosec/cyberterror.html. Accessed 25 June 2003.Google Scholar
3.Berinato, S: The truth about cyber-terrorism (2002). Available at www.cio.com/archive/031502/truth.html. Accessed 25 June 2003.Google Scholar
4.Anonymous: The basics of terrorism. Available at www.isuisse.ifrance.com/emmaf/base/baster.html. Accessed 25 June 2003.Google Scholar
5.Jane's Intelligence Review: Cyber-terrorism hype (1999). Available at www.iwar.org.uk/cyberterror/resources/janes/jir0525.htm. Accessed 25 June 2003.Google Scholar
6.Cunningham, K.Cyber-terrorism: Are we leaving the keys out? (2002). Available at www.scmagazine.com/scmagazine/sc-online/2002/article/51/article.htm. Accessed 25 June 2003.Google Scholar
7. Lawson SInformation, M.warfare: An analysis of the threat of cyber-terrorism towards the US critical infrastructure (2002). Available at www.sans.org/rr/papers/29/821.pdf. Accessed 25 June 2003.Google Scholar
8. Vaughn-Perling J. Network security: A new virtual foot solider against cyber-terrorism. Available at www.infosecnews.com/opinion/2002/04/03_04.htm. Accessed 24 June 2003.Google Scholar