The Changing Threat Model
Over the past three decades, the world witnessed the evolution of hackers from teenagers hunched over a computer in the middle of the night, WarGames style, to sophisticated cyberwarfare threats with financial and geopolitical motivations. As the stakes increased, so did the weapons, tactics, and techniques of cyberwarriors. The increased focus on attack mechanisms led to increased investment in defensive forces and tools. This cat-and-mouse game resulted in dramatic changes in the landscape of cyberwarfare and increasing attention from both government and business leaders.
Historical Hacking
The term hacker once described an individual who was extremely proficient at manipulating computers. Early computing industry ...
Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.