ABSTRACT

Depending on the type of organization, it is quite pos-

sible that terrorists may target it. Whether they target

facilities or offices for physical destruction or they select

an organization for a cyber-strike, prudent information

security practitioners will assume they have been targeted

and plan accordingly.