The life cycles of cyber threats/ Ben Buchanan
Material type: TextPublication details: 2016Subject(s): Online resources: In: Survival Vol.58, No.1, February-March 2016, pp.39-58 (106) Summary: The article highlights the vulnerabilities and exploits, techiniques and operational concepts. The applicability of life cycle analysis to cyber security is not limited to software vulnerabilities and exploits. It can be applied to specific techiniques as well as to broader operational concepts.Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | TECHNOLOGY (Browse shelf(Opens below)) | 1 | Not for loan | 46663-1001 |
The article highlights the vulnerabilities and exploits, techiniques and operational concepts. The applicability of life cycle analysis to cyber security is not limited to software vulnerabilities and exploits. It can be applied to specific techiniques as well as to broader operational concepts.
There are no comments on this title.
Log in to your account to post a comment.