© Jacob G. Oakley 2019
J. G. OakleyWaging Cyber Warhttps://doi.org/10.1007/978-1-4842-4950-5_7

7. Targeting

Jacob G. Oakley1 
(1)
Owens Cross Roads, AL, USA
 

Successful completion of the attribution process is done via a positive identification of the perpetrating actor and infallible determination of that actor’s motivation. If that motivation is deemed to be a cyber-attack, by open acknowledgment of irrefutable proof, we have established that we have an enemy. This enemy is one that is engaged in warfighting activity, targeting us, within the cyber domain. At this point that enemy must be considered as being openly engaged in conflict with our own state. As such, responses to the enemy state’s cyber-attack could be from or within any combination ...

Get Waging Cyber War: Technical Challenges and Operational Constraints now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.