Coder, hacker, soldier, spy

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A cyber attack is best understood not as an end in itself, but as a means to a wide variety of ends, some of which have serious legal, political, military, or economic ramifications. Cyber attacks may be employed for any purpose: espionage, crime, activism, terrorism, or war. They are used for competitive advantage in any and every form of human conflict. This chapter seeks to help cyber defenders classify attacks appropriately so that they can most efficiently allocate finite resources to combat this rising threat.

Cite

CITATION STYLE

APA

Geers, K. (2015). Coder, hacker, soldier, spy. Intelligent Systems, Control and Automation: Science and Engineering, 78, 73–87. https://doi.org/10.1007/978-3-319-18302-2_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free