Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.
Dorothy E. DenningI think most organizations have an interest in key recovery, at least with respect to stored data.
Dorothy E. DenningIf we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.
Dorothy E. DenningWhile the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality.
Dorothy E. Denning