Submit your comments on this article |
Science & Technology |
Computer Network Attack (CNA), a short primer |
2020-11-10 |
BLUF: [LAB 52] Apart from these "3D", and also in modern doctrines, there is a four tactic in CNA operations: manipulation, to control or to change information, the systems that support it or the target’s networks in a manner that supports the attacker’s objectives (in this case, denial in all of its modes: degradation, disruption and destruction). So, which one is the difference between a manipulation that achieves a degradation or a direct degradation as a tactic? It’s a very subtle one: mainly, manipulation refers to a manner that is not immediate apparent or detected. A DDoS (degradation or disruption) or a ransomware attack (destruction) are immediately identified by the victim... if the tactic was manipulation, the attack wouldn’t have been immediately detected, and would extend in time, so impact would have been higher a priori. In summary, while talking about CNA capabilities or operations, we identify four big tactics to be considered: degradation, disruption, destruction and manipulation. So, where are the techniques linked to each of them? This work is more complex and with less references, so it’s an ongoing work for a new post... Emphasis added |
Posted by:Besoeker |
#1 It’s a very subtle one: mainly, manipulation refers to a manner that is not immediate apparent or detected. "Subtle" unless implemented by desperate amateurs on a grand scale. |
Posted by: Besoeker 2020-11-10 06:50 |