View
646
Download
2
Category
Preview:
DESCRIPTION
Citation preview
Cyber attack offensive maneuver employed by
both individuals and whole organizations that targets
computer information systems, infrastructures, computer networks, and/ or personal
computer devices by various means of malicious acts usually originating from an anonymous
source that either steals, alters, or destroys a specified target by
hacking into a susceptible system.
politically motivated hacking to conduct sabotage and espionage
The general purpose of conventional warfare is to weaken or destroy the opponent's military force, thereby negating its ability to engage in conventional warfare.
Cyber attack as cyber warfare
Fear factor Spectacular factor Vulnerability factor
Factors for cyber-attacks
develop their plans step-by-step and acquire the appropriate software to carry out an attack
political agendas, targeting political structures
Professional hackers to cyber terrorists
straight forward considered malicious software
Syntactic attacks
Viruses are a self-replicating program that can attach itself to another program or file in order to reproduce
Viruses
Worms do not need another file or program to copy itself; it is a self-sustaining running program
Worms
“social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
Trojan horse
Espionage and national security breaches
Sabotage
ChinaMalaysiaTaiwan
Philippines and cyber attacks
Future
Recommended