SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe text presented in this practical write up is established to review the various intents, events, acts and possibilities of computing technology based terrorism and warfare. This paper will look at the broad range of cyber-terrorism and warfare as well as some intricacies. Cyber-terrorism is not necessarily a new frontier however today it is more eminent than ever. Cyber-terrorism has become a new vehicle for destroying economic, political, and sociological structures. As computers and networks become the very lifeline for every day function in America and abroad, there in lies a new avenue of exploitation by cyber-terrorists. This paper will look at environments that pose the greatest risk, profile information of who may be a threat, preventative measures and general classifications of attacks and the dangers that such attacks pose. It will briefly address the possibilities and links to human casualties of a cyber attack.