Main Content
1.3.5 User-based Vulnerabilities
2.3.5
1.3.6.a Cables
2.3.6.1
1.3.6 Communication Channels
2.3.6
1.3 Sources of Network Vulnerability
2.3
2.1.1 Cyber-Attack v. Cyber-Exploitation
3.1.1
2.1.2 Characteristics of Cyber-Operations (attack and exploitation)
3.1.2
2.1.3 Why Offense Beats Defense
3.1.3
2.1.4 Economics and Metrics
3.1.4
2.1.5 Attribution
3.1.5
2.1 Fundamental Concepts
3.1
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.