Methodological and Operational Deliberations in Cyber Attack and Cyber Exploitation

When the people think of technology, what often comes to mind are televisions, communications devices such as cell phones and satellites, computers, and different modes of transportation? Various operational deliberations associated with "Weaponizing" the basic technology of cyber attack. This paper is relevant both to the attacker, who uses cyber attack as a tool of his own choosing, and to the defender, who must handle with and respond to incoming cyber attacks launched by an attacker. However, there are other ways in which technology is applied, one of those being the Internet and its various components including email, chat rooms, and search engines. The list of uses for the Internet is innumerable and many corporations and universities are forcing people to make use of it.

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Topic: Mobility Date Added: Nov 2012 Format: PDF

Find By Topic