This article discusses the Russian cyber-attacks on Estonia and how it affected the country and what the country did to "Counter-attack" and prevent further attacks. It features several different opinions on cyber-attacks.
This document gives an in-depth analysis into the impacts on US Corporations and non-government businesses/private firms and contractors. It includes many statistics and reviews as well as collected data from a variety of sources.
This article discusses the simulated cyber "shockwave" exercise that was carried out in Washington DC as to practice in preparation for predicted cyber-attacks against the US. It looks at the impacts on power systems, politics and the use of military intervention.
without the knowledge or consent of the owner of the equipment
main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
This PDF is a report that discusses research into the economic impacts of cyber-attack on private, small-scale, large-scale, multinational, local and international corporations as well as government financial institutions.
This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
The cost of the machine has unfortunately increased from their proposed $100 USD to almost double that, in oprder to ensure that they can still get these laptops out to the kids they are selling them as pairs.