If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack — Dorothy E. Denning
Cyber terrorism could also become more attractive as the real and virtual worlds — Dorothy E. Denning
Further, the next generation of terrorists will grow up in a digital world, with ever more — Dorothy E. Denning
I don’t have a particular recommendation other than that we base decisions on as much — Dorothy E. Denning
I think most organizations have an interest in key recovery, at least with respect to stored data. — Dorothy E. Denning
I favor strategies that encourage industry to include some sort of key recovery capability — Dorothy E. Denning
We have never really had absolute privacy with our records or our electronic communications — Dorothy E. Denning
Systems are complex, so controlling an attack and achieving a desired level of damage — Dorothy E. Denning
With those people, I’m very far apart, because I believe that government access to — Dorothy E. Denning
While many hackers have the knowledge, skills, and tools to attack computer systems — Dorothy E. Denning
While the vast majority of hackers may be disinclined towards violence, it would only — Dorothy E. Denning