Advertisement

Weaponization of Computers

  • Henry Prunckun
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

This chapter examines how computer hardware and software can be weaponized. It draws analogies with other items of common use and shows how, why, and by whom cyber technology is weaponization. It concludes with a discussion of the implications for policy and ramifications for practice.

Keywords

Computers Weaponization Counterintelligence Deception Dual-purpose cyber weapons Kill chain 

Reference

  1. Prunckun H (1989) Information security: a practical handbook on business counterintelligence. Charles C Thomas Publisher, SpringfieldGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Australian Graduate School of Policing and SecurityCharles Sturt UniversitySydneyAustralia

Personalised recommendations