Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet.
Dorothy E. DenningI favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
Dorothy E. Denning