dc.contributor.author |
Grant, T
|
|
dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2016-07-22T07:40:45Z |
|
dc.date.available |
2016-07-22T07:40:45Z |
|
dc.date.issued |
2015-10 |
|
dc.identifier.citation |
Grant, T, Burke, I and Van Heerden R. 2015. Comparing models of offensive cyber operations. In: Leading Issues in Cyber Warfare and Security, Volume 2, pp 35-56 |
en_US |
dc.identifier.issn |
978-1-910810-64-4 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/8677
|
|
dc.identifier.uri |
https://www.researchgate.net/publication/264543260_Comparing_Models_of_Offensive_Cyber_Operations
|
|
dc.description |
Copyright: Academic Bookshop. Publisher: Academic Bookshop, UK. Due to
copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. |
en_US |
dc.description.abstract |
Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the question, " What resources would be needed by a Cyber Security Operations Centre in order to perform offensive cyber operations?". The analysis was performed, using as a springboard seven models of cyber-attack, and resulted in the development of what is described as a canonical model. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Bookshop |
en_US |
dc.relation.ispartofseries |
Worklist;15822 |
|
dc.subject |
Offensive cyber operations |
en_US |
dc.subject |
Process models |
en_US |
dc.subject |
Rational reconstructions |
en_US |
dc.subject |
Canonical models |
en_US |
dc.subject |
Structured analysis and design technique |
en_US |
dc.subject |
SADT |
en_US |
dc.title |
Comparing models of offensive cyber operations |
en_US |
dc.type |
Book Chapter |
en_US |
dc.identifier.apacitation |
Grant, T., Burke, I. D., & Van Heerden, R. P. (2015). Comparing models of offensive cyber operations., <i>Worklist;15822</i> Academic Bookshop. http://hdl.handle.net/10204/8677 |
en_ZA |
dc.identifier.chicagocitation |
Grant, T, Ivan D Burke, and Renier P Van Heerden. "Comparing models of offensive cyber operations" In <i>WORKLIST;15822</i>, n.p.: Academic Bookshop. 2015. http://hdl.handle.net/10204/8677. |
en_ZA |
dc.identifier.vancouvercitation |
Grant T, Burke ID, Van Heerden RP. Comparing models of offensive cyber operations.. Worklist;15822. [place unknown]: Academic Bookshop; 2015. [cited yyyy month dd]. http://hdl.handle.net/10204/8677. |
en_ZA |
dc.identifier.ris |
TY - Book Chapter
AU - Grant, T
AU - Burke, Ivan D
AU - Van Heerden, Renier P
AB - Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the question, " What resources would be needed by a Cyber Security Operations Centre in order to perform offensive cyber operations?". The analysis was performed, using as a springboard seven models of cyber-attack, and resulted in the development of what is described as a canonical model.
DA - 2015-10
DB - ResearchSpace
DP - CSIR
KW - Offensive cyber operations
KW - Process models
KW - Rational reconstructions
KW - Canonical models
KW - Structured analysis and design technique
KW - SADT
LK - https://researchspace.csir.co.za
PY - 2015
SM - 978-1-910810-64-4
T1 - Comparing models of offensive cyber operations
TI - Comparing models of offensive cyber operations
UR - http://hdl.handle.net/10204/8677
ER -
|
en_ZA |