Publication

Jul 2015

This paper proposes a systematic and comprehensive way to categorize and measure disruptive cyber-attacks. More specifically, the paper's author tries to differentiate between exploitative and five types of disruptive attacks. Such parsing, the author further argues, enables organizations and policymakers to 1) examine and identify individual threats to their networks; 2) estimate the potential effect of malicious cyber assaults; 3) identify where defensive measures are necessary; and 4) distinguish between malicious cyber activities that are more significant for the private sector as opposed to the public sector.

Download English (PDF, 40 pages, 770 KB)
Author Charles Harry
Series CISSM Working Papers
Publisher Center for International and Security Studies at Maryland (CISSM)
Copyright © 2015 Center for International and Security Studies at Maryland (CISSM)
JavaScript has been disabled in your browser