Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for hactivism

Cyber Warfare: Chapter 2

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld

Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and today I am sharing what I am reading in…Cyber Warfare Techniques Tactics and Tools for Security Practitioners - Book review by Dovell Bonnett of Access Smart.com

Chapter 2: The Cyberspace Battlefield

All wars have a battlefield and cyber warfare is no different. Where conventional warfare have solders within a country’s border, terrorism has expanded the fighter’s deployment and cyberspace has obviated both deployment and borders. A cyber attacker can actually be located within your own country, be a fellow citizen or even one of your allies. What is also ironic is that human suffering is collateral damage since the actual attack is not human against human or machine against human, but machine against machine. Human life is devastated by what happens when a machine malfunctions. Read More→