By Topic

Help for cyberterrorism: Y2K's silver lining

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Hwang, J.D. ; Inf. Technol. Agency, Los Angeles, CA, USA

We have seen numerous concerted efforts to deal with worldwide problems that potentially affected everyone, such as world wars and health hazards. We are now witnessing a different kind of global mobilization to conquer the Y2K problem. To remedy the Y2K problem, IT departments throughout the world have had to direct enormous resources to perform an in-depth analysis of their computers. We have inventoried software, hardware, and applications; fixed code; replaced noncompliant components and embedded chips; and developed contingency plans. Contingency planning is a major endeavor to ensure continuity of operations even if Y2K bugs persist and cause a system failure. In all this planning is 1st January 2000 the ideal time for a terrorist to strike? So now, as we turn the corner on Y2K, I believe we need to focus on this other large problem: terrorism through cyberspace-cyberterrorism. I consider cyberterrorism to be the use of information technology to disrupt critical infrastructure. Y2K can pay dividends by helping us to protect that infrastructure

Published in:

IT Professional  (Volume:1 ,  Issue: 1 )