Understanding and Developing a Threat Assessment Model

@inproceedings{Vidalis2002UnderstandingAD,
  title={Understanding and Developing a Threat Assessment Model},
  author={Stilianos Vidalis and Andrew Blyth},
  year={2002}
}
The wide development of the mobile Internet technology is creating the opportunity for companies to extensively utilise computer systems for the delivery of services. New business models, which rely on electronic payment systems, are emerging and each one is creating a vulnerability to the Critical National Information Infrastructure (CNII). The opportunity for deploying offensive information warfare tactics against the CNII will be greatly enlarged from the introduction of such systems and the… CONTINUE READING