Weaponization of Computers
This chapter examines how computer hardware and software can be weaponized. It draws analogies with other items of common use and shows how, why, and by whom cyber technology is weaponization. It concludes with a discussion of the implications for policy and ramifications for practice.
KeywordsComputers Weaponization Counterintelligence Deception Dual-purpose cyber weapons Kill chain
- Prunckun H (1989) Information security: a practical handbook on business counterintelligence. Charles C Thomas Publisher, SpringfieldGoogle Scholar