The cybersecurity landscape consists of:
- Assets: personal, software and hardware.
- Security: hardware and software.
- Threats: human, software and hardware.
- Adversaries: individuals, organisations, Nation-States and governmennts
Hacking is a process and is described by means of The Lockheed Martin cybersecurity chain. This consists of:
The cyberattack effects consists of the following items:
Primary effects have a direct impact on targeted devices.
Secundairy effects have an impact on organizational processes and capability: so on revenue, remediation and reputation.
Second order effects are the impacts on society: physical, macro-economic, informational/perception.