TY - STAND AB - A systematic study of the security of any system requires the description of three concepts: the security goals we want to achieve, the threats we expect to face, and the mechanisms and tools we can use to protect the system. BT - eecs N1 - There has been a lot of speculation about state-funded cyber militias and espionage, but without identifying the clear culprits of several of the recent attacks,there is no conclusive evidence for most claims. However, three things are clear:(1) most governments are investing in cyber warfare activities (in defense and offense), given that any conflict in the twenty-first century will necessarily involve the use of information technology, (2) any conflict, or international tension inthe physical world, will have its counterpart effect in the Internet, and (3) there are large economic incentives for crime in the Internet. If we leave these activities unchecked, they will increase. N2 - A systematic study of the security of any system requires the description of three concepts: the security goals we want to achieve, the threats we expect to face, and the mechanisms and tools we can use to protect the system. PY - 2008 T2 - eecs TI - Cyber Security Basic Defenses and Attack Trends UR - https://people.eecs.berkeley.edu/~sastry/pubs/Pdfs%20of%202008/CardenasCyber2008.pdf ER -