Share
×
Inspirational Quotes
Authors
Professions
Topics
Tags
Quote
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.
Dorothy E. Denning
Share
Change background
T
T
T
Change font
Original
TAGS & TOPICS
Dorothy E. Denning
Age: 79
Born: 1945
Born: August 12
Computer Science Researcher
Computer Scientist
Grand Rapids
Michigan
Dorothy Elizabeth Denning
Actors
Terrorist
Given
Vulnerable
Infrastructures
Carry
Cyber
Take
Critical
Operation
Motivation
Infrastructure
Becomes
Capability
Question
Operations
Whether
Attack
More quotes by Dorothy E. Denning
While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality.
Dorothy E. Denning
Everyone is a proponent of strong encryption.
Dorothy E. Denning
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions.
Dorothy E. Denning
However, leaving everything to the market is not necessarily good for society.
Dorothy E. Denning
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
Dorothy E. Denning
We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.
Dorothy E. Denning
Although cyber attacks have caused billions of dollars in damage and affected the lives of millions, few if any can be characterised as acts of terrorism.
Dorothy E. Denning
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.
Dorothy E. Denning
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.
Dorothy E. Denning