Tabla de Contenidos:
  • Introduction
  • Background
  • Issues for Congress
  • Legislative activity
  • Appendix A. Planning for a cyberattack
  • Appendix B. Characteristics of malicious code
  • Appendix C. Similarities in tactics used for cyberattacks and conventional terrorist attacks.