Mobility

Methodological and Operational Deliberations in Cyber Attack and Cyber Exploitation

Free registration required

Executive Summary

When the people think of technology, what often comes to mind are televisions, communications devices such as cell phones and satellites, computers, and different modes of transportation? Various operational deliberations associated with "Weaponizing" the basic technology of cyber attack. This paper is relevant both to the attacker, who uses cyber attack as a tool of his own choosing, and to the defender, who must handle with and respond to incoming cyber attacks launched by an attacker. However, there are other ways in which technology is applied, one of those being the Internet and its various components including email, chat rooms, and search engines. The list of uses for the Internet is innumerable and many corporations and universities are forcing people to make use of it.

  • Format: PDF
  • Size: 918 KB