ABSTRACT
Depending on the type of organization, it is quite pos-
sible that terrorists may target it. Whether they target
facilities or offices for physical destruction or they select
an organization for a cyber-strike, prudent information
security practitioners will assume they have been targeted
and plan accordingly.