northeastern university seal

Cyber Operations in DOD Policy and Plans: Issues for Congress

Topics: Information Technology and Cybersecurity,

This report describes various cyber-weapons used by cyber-aggressors including worms, viruses and other malware. The report also identifies targets of cyberattacks, including the government and military, critical infrastructure systems, and industrial control systems. The report then reviews three cyberattack case studies and the way cyberattacks were used to supplement or achieve an objective.

View Source