Combatants in Cyberwarfare
The variety of possible combatants in cyberwar is as broad as the types of cyberwarfare. Military units with network security and cyberwar capabilities, intelligence organizations, businesses, insurrectionist and terrorist organizations, law enforcement, activist groups, and even individuals can all participate in cyberwar-related activities. Their capabilities, motivations, and the rules they operate by vary greatly. Defenders must be prepared to deal with attackers who have significant resources if defenders have valuable data, infrastructure, or access.
TABLE 2-1 Mapping information operations to common cyberwar targets.
INFORMATION OPERATIONS TECHNIQUE | TARGETS |
---|---|
Computer network attack | Networks, computers, ... |
Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.