ISM Whitepaper: Cyber Risk in Critical National Infrastructure (http://www.cybersecurity-india.com/redF ... _id=548396)
In the realm of cyber security, threats are treated in isolation, analysed in separation from the actor behind the attack, or the cyber weapon that is utilised in the incident. This may have been because of a lack of resources and skills, or it may be because organisations do not see how the identity of the actor affects their tactical choices in deploying its defence, unless the attack was perpetrated internally.
I hope you like it, feel free to email me at email@example.com if you want to avoid the download form and just get the file directly.
Thanks, have a great weekend!