Click in the field, then press CTRL+C to copy the HTML code
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.
quote by
Dorothy Denning
solid border
dashed border
dotted border
double border
groove border
ridge border
inset border
outset border
no border
blue
green
red
purple
cyan
gold
silver
black