Abstract
Cyber end effect activities fall into the two categories of cyber-reconnaissance for intelligence gathering and cyber-attacks. The previously discussed activity of cyber exploitation is necessary in many cases to enable intelligence gathering and is always necessary for cyber-attacks. Some might argue that exploitation is not always needed to attack another system and that they could do things like denial-of-service attacks, and so much traffic the remote system cannot keep up and fails in some way. If we revisit our definition of exploitation though, and its purpose of manipulating the target system to cause behavior that benefits the attacker, we can see how attacks are in fact exploitation. If I am sending too much traffic for a routing system to handle and it fails over into an open state, allowing all traffic, or even if it just shuts down or stops processing traffic from other senders as well, then I have manipulated that system to behave in a way I wanted which means I exploited it.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Jacob G. Oakley
About this chapter
Cite this chapter
Oakley, J.G. (2019). Cyber-Attack. In: Waging Cyber War. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4950-5_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4950-5_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4949-9
Online ISBN: 978-1-4842-4950-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)