Abstract
This chapter examines how computer hardware and software can be weaponized. It draws analogies with other items of common use and shows how, why, and by whom cyber technology is weaponization. It concludes with a discussion of the implications for policy and ramifications for practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
It is presumed that Israel has nuclear weapons, but this has not been established with any certainly.
- 2.
The term kill chain is used in the military. It refers to the attack process, or a chain of events and decisions. The process comprises: (1) identifying a target; (2) determining its location or position; (3) decision whether to attack; (4) and either standing-down, observing further, and/or using the data for intelligence, or to attack the target. Viewed in reverse, if an opposition’s kill chain can be disrupted, the theory is that a successful attack is not possible.
Reference
Prunckun H (1989) Information security: a practical handbook on business counterintelligence. Charles C Thomas Publisher, Springfield
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Prunckun, H. (2018). Weaponization of Computers. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-74107-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74106-2
Online ISBN: 978-3-319-74107-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)