You have commented 358 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Science & Technology
Computer Network Attack (CNA), a short primer
2020-11-10
BLUF:
[LAB 52] Apart from these "3D", and also in modern doctrines, there is a four tactic in CNA operations: manipulation, to control or to change information, the systems that support it or the target’s networks in a manner that supports the attacker’s objectives (in this case, denial in all of its modes: degradation, disruption and destruction). So, which one is the difference between a manipulation that achieves a degradation or a direct degradation as a tactic? It’s a very subtle one: mainly, manipulation refers to a manner that is not immediate apparent or detected. A DDoS (degradation or disruption) or a ransomware attack (destruction) are immediately identified by the victim... if the tactic was manipulation, the attack wouldn’t have been immediately detected, and would extend in time, so impact would have been higher a priori.

In summary, while talking about CNA capabilities or operations, we identify four big tactics to be considered: degradation, disruption, destruction and manipulation. So, where are the techniques linked to each of them? This work is more complex and with less references, so it’s an ongoing work for a new post...
Emphasis added
Posted by:Besoeker

#1  It’s a very subtle one: mainly, manipulation refers to a manner that is not immediate apparent or detected.

"Subtle" unless implemented by desperate amateurs on a grand scale.
Posted by: Besoeker   2020-11-10 06:50  

00:00