Publication
Jul 2015
This paper proposes a systematic and comprehensive way to categorize and measure disruptive cyber-attacks. More specifically, the paper's author tries to differentiate between exploitative and five types of disruptive attacks. Such parsing, the author further argues, enables organizations and policymakers to 1) examine and identify individual threats to their networks; 2) estimate the potential effect of malicious cyber assaults; 3) identify where defensive measures are necessary; and 4) distinguish between malicious cyber activities that are more significant for the private sector as opposed to the public sector.
Download |
English (PDF, 40 pages, 770 KB) |
---|---|
Author | Charles Harry |
Series | CISSM Working Papers |
Publisher | Center for International and Security Studies at Maryland (CISSM) |
Copyright | © 2015 Center for International and Security Studies at Maryland (CISSM) |