Authors: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.

Dorothy Denning