O'Reilly logo

Research Methods for Cyber Security by David O. Manz, Thomas W. Edgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

Addressing the Adversary

Abstract

The fundamental nature of cyber security is predicated on the notion of an adversary and the adversarial nature of cyber security is a key feature that differentiates it from most other fields of science. This chapter will explore that adversary in more detail, since without an understanding of who you are protecting against, you will be at a disadvantage. Research is necessary to provide the required data to inform an adversarial approach to security, and the ability to model and simulate adversaries is a fundamental requirement in performing research to answer questions that involve adversarial actions or effect.

This chapter will delve into the specifics of the adversary challenge in cyber security, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required