Distinguishing Cyber Attacks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Hacktivism

The convergence of political activism and computer hacking, intended to disrupt normal operations but not to cause serious damage. It's a form of civil disobedience (e.g., hackers exposing Sony BMG).

2
New cards

Cyberterrorism

The use of cybertechnology and terrorism to carry out acts of terror in or via cyberspace. It consists of activities intended to cause great harm, such as loss of life or severe economic damage (e.g., electrical grid shutdowns, ransomware on critical systems).

3
New cards

Information Warfare

Cyberattacks designed to mislead, disrupt, or damage military or economic infrastructure of an adversary (e.g., election interference, Stuxnet attack on Iranian uranium refineries).

4
New cards

How is Information Warfare often distinguished from Cyberterrorism, particularly using Just War Theory?

In Information Warfare, distinctions between combatants and noncombatants are typically respected, and attacks are generally not pre-emptive, unlike the broad harm goals of terrorism.