The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.
From page 77... ...
As the chapter makes clear, there are many different kinds of cyberattack with many different kinds of objectives, and the term "cyberattack" without further qualification should be seen more as a statement about the use of a particular attack methodology than about its targets or purpose. The operational dimensions refer to the support that a successful cyberattack requires, such as intelligence information about its targets and ways to start, stop, and calibrate a cyberattack.
|
Key Terms
This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More
information on Chapter Skim is available.