Examines the vulnerability of critical infrastructure remote control computer systems to terrorist cyber-attack. Discusses current remote control computer system vulnerability, magnitude and potential consequences of a terrorist attack, current initiatives, and policy options.
ProQuest U.S. Congressional Research Digital Collection
Note
Record is based on bibliographic data in ProQuest U.S. Congressional Research Digital Collection (last viewed July 2010). Reuse except for individual research requires license from ProQuest, LLC. CRS Report. AVAILABLE ONLINE TO AUTHORIZED PSU USERS.