The life cycles of cyber threats/ Ben Buchanan

By: Material type: TextTextPublication details: 2016Subject(s): Online resources: In: Survival Vol.58, No.1, February-March 2016, pp.39-58 (106) Summary: The article highlights the vulnerabilities and exploits, techiniques and operational concepts. The applicability of life cycle analysis to cyber security is not limited to software vulnerabilities and exploits. It can be applied to specific techiniques as well as to broader operational concepts.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Journal Article Mindef Library & Info Centre Journals TECHNOLOGY (Browse shelf(Opens below)) 1 Not for loan 46663-1001

The article highlights the vulnerabilities and exploits, techiniques and operational concepts. The applicability of life cycle analysis to cyber security is not limited to software vulnerabilities and exploits. It can be applied to specific techiniques as well as to broader operational concepts.

There are no comments on this title.

to post a comment.