Skip to Main Content
Cyber Power
book

Cyber Power

by Solange Ghernaouti-Helie
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
15h 17m
English
EPFL Press
Content preview from Cyber Power
Cyberconicts, Cyberwars and Cyberpower 173
"688>&,.-D6&$16604J$'8-,0B$.2-14B$
&'I40'L'(4B$46.,-0$50-p6(84B$I'K4,1'4E$
H6&'*$(-,4,&)$$
F(64'0*DZ,&)B$,C'606)*$-I-('&'44$
<'.(>,18'&1B$'1.9$
Figure 6.14 Internet as an enabling tool for terrorists.
A question of interpretation
It is necessary to be extremely careful about the origins of computing attacks
that harm symbols and are reported as the work of cyber-terrorists, because
the events could be part of a wider effort of manipulation. There is a funda-
mental difference between the theoretical possibility of an attack and actual
performance of such an attack. There is a lack of quantitative elements ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Minds

Cyber Minds

Shira Rubinoff
Cybercrime

Cybercrime

Todd Wade

Publisher Resources

ISBN: 9781466573048