A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
2011
Journal of Strategic Security
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-existing weaknesses in the underlying technology. Because these vulnerabilities that exist in the network are not themselves illegal, they tend to be overlooked in the debate on cyber security. A UK report on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the "costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing
doi:10.5038/1944-0472.4.2.5
fatcat:cqfwfgitprgnrfyjin2rn7b3ri