In ten pages this paper discusses biological and nuclear terrorist attacks and how information security can minimize their impacts. Eight sources are cited in the bibliography.