Fascinating read on proportionality of cyber war/attack: Is this approach in recent pres directive? #cyber
It’s not just the method of infection that differs from malware to malware. All malware takes up some hard drive space or uses system memory. Generally, it’s only a small percentage of a system’s capacity, but if enough malicious code targeted a system, it could use enough system resources to affect the operation of the computer. Some malware requires the host machine to restart in order to be fully installed, just as many legitimate programs do. For this reason, part of the malicious code might be a command to force the host machine to reboot. Arguably, the forced reboot of the host machine to enable access begins the transition from mere access to cyber disruption, because rebooting “disrupts” the function of the computer for a brief period. It’s difficult to define exactly where the change occurs, because operations differ from each other in subtle ways. At some point, ...