Item Details
Skip Navigation Links
   ActiveUsers:576Hits:19913106Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID188292
Title ProperDistinguishing Cyberattacks by Difficulty
LanguageENG
AuthorThomas, M A
Summary / Abstract (Note)Some discussions of cyberattacks paint them broadly as low cost and widely available, failing to distinguish cyberattacks by difficulty. However, as the literature has long recognized, cyberattacks are not all alike. The most sophisticated attacks require greater capabilities, including noncyber capabilities, that are commanded by only by a handful of states. Assessment of the difficulty of cyberattacks therefore requires a broader view of a cyberattack than a view focused on gaining and maintaining unauthorized access to a computer. The proposed Cyber Effects model of a cyberattack looks to the ultimate effect sought by the attacker, which may be focused only on gaining access to a device or may seek access to produce a cascade of external effects. This model can then be used as a conceptual model to organize factors that bear on attack difficulty for assessment.
`In' analytical NoteInternational Journal of Intelligence and CounterIntelligence Vol. 35, No.4; Winter 2022-2023: p.784-805
Journal SourceInternational Journal of Intelligence and Counter Intelligence Vol: 35 No 4
Key WordsCyberattacks


 
 
Media / Other Links  Full Text