A model to facilitate discussions about cyber attacks

J Happa, G Fairclough - Ethics and Policies for Cyber Operations: A NATO …, 2017 - Springer
The evolution of the Internet and digital systems is making it increasingly difficult to
understand cyber attacks. Politicians, ethicists, lawyers, business owners and other …

Comparing models of offensive cyber operations

T Grant, I Burke, R Van Heerden - Leading Issues in Cyber …, 2015 - books.google.com
Cyber operations denote the response of governments and organisations to cyber crime,
terrorism, and warfare. To date, cyber operations have been primarily defensive, with the …

Assessing Harm from Cyber Crime

E Ignatuschtschenko - The Oxford Handbook of Cyber Security, 2021 - books.google.com
Harm, or the potential for harm, is a key notion in deciding whether an act is considered to
be either criminal or non-criminal in legal-philosophical theory (Mill 1869, 13–47; Feinberg …

Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers

B Arief, MAB Adzmi, T Gross - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Although cybercrime is rampant, there is no authoritative definition of the term and all that it
implies. A comprehensive model and taxonomy of cybercrime, including all of its …

A review on cybersecurity: Challenges & emerging threats

A Hussain, A Mohamed, S Razali - … of the 3rd international conference on …, 2020 - dl.acm.org
In recent years the cybersecurity has evolved significantly in order to cater to the changes
that occur within the cyberspace. Cybersecurity is the means by which a country or …

Toward a better understanding of “cybersecurity”

JVD Ham - Digital Threats: Research and Practice, 2021 - dl.acm.org
The term “cybersecurity” has gained widespread popularity but has not been defined
properly. The term is used by many different people to mean different things in different …

Cyberattacks: Why, what, who, and how

S Liu, B Cheng - IT professional, 2009 - ieeexplore.ieee.org
As computers, information systems, and networking have become increasingly ubiquitous,
cybersecurity has become even more critical for the continuity of basic business operations …

[PDF][PDF] Methodological and Operational deliberations in Cyber attack and Cyber exploitation

KD Gupta, J Joshi - International Journal, 2012 - academia.edu
When we think of technology, what often comes to mind are televisions, communications
devices such as cell phones and satellites, computers, and different modes of …

[图书][B] Assessing cyber security: A meta analysis of threats, trends, and responses to cyber attacks

M Gehem, A Usanov, E Frinking, M Rademaker - 2015 - books.google.com
Over the years, a plethora of reports has emerged that assess the causes, dynamics, and
effects of cyber threats. This proliferation of reports is an important sign of the increasing …

Overview of Recent Cyberattacks: A Systematic Review

I Emmanuel O, OE I - … on Science, Engineering and Business for …, 2023 - ieeexplore.ieee.org
The world now revolves around automated processes and communication between
individuals, communities, organizations and indeed Nations which has caused a surge in …