Cyber-attack studies are at the core of cybersecurity studies. Cyber-attacks threaten our ability to use the Internet safely, productively, and creatively worldwide and are the source of many security concerns. However, the "cyberattack" concept is underdeveloped in the academic literature and what is meant by cyber-attack is not clear.To advance theory, design and operate databases to support scholarly research, perform empirical observations, and compare different types of cyber-attacks, it is necessary to first clarify the "concept of cyber-attack". In this thesis, the following research question is addressed: How to represent a cyber-attack?Entity Relationship Diagrams are used to examine definitions of cyber-attacks available in the literature and information on ten successful high-profile attacks that is available on the Internet. This exploratory research contributes a representation and a definition of the concept of cyber-attack. The representation organizes data on cyber-attacks that is publicly available on the Internet into nine data entities, identifies the attributes of each entity, and the relationships between entities. In this representation, Adversary 1 (i.e., attacker) acts to: i) undermine Adversary 2's networks, systems, software or information or ii) damage the physical assets they control.Both adversaries share cyberspace and are affected by factors extrinsic to their organizations. Adversary 2 is comprised of two parts; one includes the organizations that operate the network and the other that is extrinsic to the iii organizations that operate the network.Although this research will be of interest to a broad community, it will be of particular interest to senior executives, government contractors, and researchers interested in contributing to the development of an interdisciplinary and global theory of cybersecurity. iv Acknowledgements I don't have the words to express my full gratitude but I would like to express my deepest appreciation and thanks to my advisor Professor Dr. Tony Bailetti, who has been a tremendous mentor for me. You have done beyond a supervisor's responsibility. It has been such a great honour to be your student. I can write a dissertation on how a wonderful human being you are. This thesis would not have been possible without the guidance and the help of Professor Bailetti. Thank you for being best possible role model I could have hoped for. Working with you has been a most rewarding moment of my life. For your patience, kindness, advice and devotion, thank you.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.