ABSTRACT

Threats and risks from cyberspace have become a popular theme in the mass media, the security policy community, and the risk consultant and IT industry. Probably everybody with some interest in computers and politics has already heard of the hackers, cyberterrorists or foreign intelligence agencies electronically breaking into computers that control dams or air traffic control systems, wreaking havoc and endangering not only thousands of lives, but national security itself.