New! H2O now has access to new and up-to-date cases via CourtListener and the Caselaw Access Project. Click here for more info.

Main Content

Cybersecurity Curriculum

2.1.2 Characteristics of Cyber-Operations (attack and exploitation)

All cyber-operations – both attacks, and exploitations – requires three things: a vulnerability, access to the vulnerability, and a payload.