ResearchSpace

Comparing models of offensive cyber operations

Show simple item record

dc.contributor.author Grant, T
dc.contributor.author Burke, Ivan D
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2016-07-22T07:40:45Z
dc.date.available 2016-07-22T07:40:45Z
dc.date.issued 2015-10
dc.identifier.citation Grant, T, Burke, I and Van Heerden R. 2015. Comparing models of offensive cyber operations. In: Leading Issues in Cyber Warfare and Security, Volume 2, pp 35-56 en_US
dc.identifier.issn 978-1-910810-64-4
dc.identifier.uri http://hdl.handle.net/10204/8677
dc.identifier.uri https://www.researchgate.net/publication/264543260_Comparing_Models_of_Offensive_Cyber_Operations
dc.description Copyright: Academic Bookshop. Publisher: Academic Bookshop, UK. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. en_US
dc.description.abstract Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the question, " What resources would be needed by a Cyber Security Operations Centre in order to perform offensive cyber operations?". The analysis was performed, using as a springboard seven models of cyber-attack, and resulted in the development of what is described as a canonical model. en_US
dc.language.iso en en_US
dc.publisher Academic Bookshop en_US
dc.relation.ispartofseries Worklist;15822
dc.subject Offensive cyber operations en_US
dc.subject Process models en_US
dc.subject Rational reconstructions en_US
dc.subject Canonical models en_US
dc.subject Structured analysis and design technique en_US
dc.subject SADT en_US
dc.title Comparing models of offensive cyber operations en_US
dc.type Book Chapter en_US
dc.identifier.apacitation Grant, T., Burke, I. D., & Van Heerden, R. P. (2015). Comparing models of offensive cyber operations., <i>Worklist;15822</i> Academic Bookshop. http://hdl.handle.net/10204/8677 en_ZA
dc.identifier.chicagocitation Grant, T, Ivan D Burke, and Renier P Van Heerden. "Comparing models of offensive cyber operations" In <i>WORKLIST;15822</i>, n.p.: Academic Bookshop. 2015. http://hdl.handle.net/10204/8677. en_ZA
dc.identifier.vancouvercitation Grant T, Burke ID, Van Heerden RP. Comparing models of offensive cyber operations.. Worklist;15822. [place unknown]: Academic Bookshop; 2015. [cited yyyy month dd]. http://hdl.handle.net/10204/8677. en_ZA
dc.identifier.ris TY - Book Chapter AU - Grant, T AU - Burke, Ivan D AU - Van Heerden, Renier P AB - Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the question, " What resources would be needed by a Cyber Security Operations Centre in order to perform offensive cyber operations?". The analysis was performed, using as a springboard seven models of cyber-attack, and resulted in the development of what is described as a canonical model. DA - 2015-10 DB - ResearchSpace DP - CSIR KW - Offensive cyber operations KW - Process models KW - Rational reconstructions KW - Canonical models KW - Structured analysis and design technique KW - SADT LK - https://researchspace.csir.co.za PY - 2015 SM - 978-1-910810-64-4 T1 - Comparing models of offensive cyber operations TI - Comparing models of offensive cyber operations UR - http://hdl.handle.net/10204/8677 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record