1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Cyber what? (part 2 of 2)

Discussion in 'CSO' started by RSS, Mar 30, 2015.

  1. RSS

    RSS New Member Member

    This is part two of a two part series on cyber space, cyber war and other concepts. (See part 1.)

    All the different “cyber” terms sure are confusing and it’s no help that many of the terms used to describe the threat actor behind a cyber attack are often used interchangeably. In part I, we established what constitutes a “cyber attack” within “cyberspace”. Now the real fun begins – we’ll dissect the four most commonly confused terms: “cyber war,” cyber terrorism,” “cyber vandalism” and “cyber espionage” and provide a common lexicon. The objective is to dispel myths and, by establishing common understanding, provide a way for managers to cut to the chase and understand risk without all the FUD. The graph below shows the four terms and attributes at a glance.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page