What Does a Cyberweapon Attack Look Like?
The diagram above, from Technolytics, shows the processes and phases of a cyberweapon attack. You can use your imagination to try to understand how an entity (like the U.S.) could conceivably use such cyberweapons to punish or retaliate against an adversary to accomplish a military and/or political objective.
= = = = = = = = = = = = = = = = = = = = = = =
William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002,
ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
CIS 537 Blog: http://cis537-wfs.blogspot.com
http://billslater.com/career
Chicago, IL
United States of America
No comments:
Post a Comment