1、 https:/crsreports.congress.gov Updated March 23, 2015CybersecurityOverview Information and communications technology (ICT) has evolved greatly over the last half-century. ICT devices and components now form a highly interdependent system of networks, infrastructure, and resident dataknown as cybers
2、pacethat has become ubiquitous and increasingly integral to almost every facet of modern society. Experts and policymakers are increasingly concerned about cybersecurityprotecting cyberspace from attack by criminals and other adversaries. The risks associated with any attack depend on three factors:
3、 threats (who is attacking), vulnerabilities (how they are attacking), and impacts (what the attack does). What are the threats? People who perform cyberattacks include criminals intent on monetary gain from crimes such as theft or extortion; spies intent on stealing information used by government o
4、r private entities; nation-state warriors who develop capabilities and undertake cyberattacks to support strategic objectives; “hacktivists” who perform cyberattacks for nonmonetary reasons; and terrorists who engage in cyberattacks as a form of non-state or state-sponsored warfare. What are the vul