Abstract
When people generally speak of cyber-attacks or cyber warfighting, the onus typically seems to be on the end effect of the attack. This is understandable as the attack portion of cyber-attacks is usually a cyber-physical effect that even non-technical people can understand the impact of. When a cyber-attack can take control of a vehicle’s braking and steering, for instance, the cyber-physical effect of the attack is what makes the news. To the non-technical, losing control of their vehicle is highly relatable. Whereas the hackers among us are more interested in how the vehicle controlling code was delivered to the vehicle and how it was able to take over those computing functions. The term cyber-attack is commonly conveyed and interpreted as the entire process of bringing the attack end effect to bear on a system. In actuality the process involves cyber intelligence gathering or reconnaissance, cyber exploitation, and then ultimately a cyber-attack effect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Jacob G. Oakley
About this chapter
Cite this chapter
Oakley, J.G. (2019). Cyber Exploitation. In: Waging Cyber War. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4950-5_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4950-5_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4949-9
Online ISBN: 978-1-4842-4950-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)