computer network attack
Operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Electronic attack (EA) can be used against a computer, but it is not computer network attack (CNA). CNA relies on the data stream to execute the attack while EA relies on the electromagnetic spectrum. An example of the two operations is the following: sending a code or instruction to a central processing unit that causes the computer to short out the power supply is CNA. Using an electromagnetic pulse device to destroy a computer

Military dictionary. 2000.

Look at other dictionaries:

  • Computer Network Operations — (CNO) (dt. Computer Netzwerk Operationen) ist ein militärischer Begriff der mehrere Unterbegriffe umfasst. Inhaltsverzeichnis 1 Computer Network Attack 2 Computer Network Defense 3 Computer Network Exploitation …   Deutsch Wikipedia

  • Computer network operations — (CNO) is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an ever expanding network of… …   Wikipedia

  • computer network defense — Defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. Also called CND. See also computer network attack …   Military dictionary

  • Computer crime — Computer crime, or cybercrime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3]… …   Wikipedia

  • Network Crack Program Hacker (NCPH) Group — Formation 1994 (1994) Type hacker group Location Sichuan Province, China Membership 4 core members, aprox. 10 members ( …   Wikipedia

  • Network encryption cracking — is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special encryption cracking software. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and… …   Wikipedia

  • Network vulnerability scan — Network vulnerability scans are scans used to determine vulnerabilities in a network. A scan can be used by security experts to protect the security of a network, such as that of a company, from an outside attack. Hackers may use a scan to find… …   Wikipedia

  • Network congestion avoidance — is a process used in computer networks to avoid congestion.The fundamental problem is that all network resources are limited, including router processing time and link throughput. Eg.: *today s (2006) Wireless LAN effective bandwidth throughput… …   Wikipedia

  • Computer fraud — is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines. Contents 1 Notable incidents 2 See also 3 External… …   Wikipedia

  • Network intelligence — (NI) is a technology that builds on the concepts and capabilities of Deep Packet Inspection (DPI), Packet Capture and Business Intelligence (BI). It examines, in real time, IP data packets that cross communications networks by identifying the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”