Gaining access to well-protected information or systems in closed networks remains a resource-intensive effort involving traditional espionage tradecraft. Such operations do not require the simultaneous access to large numbers of systems needed for a strategic attack and thus are within reach of a much larger array of foreign adversaries.
Attributes | Values |
---|---|
rdfs:label |
|
rdfs:comment |
|
dcterms:subject | |
abstract |
|