The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Advertisement
Sign In
Register
The IT Law Wiki
34,539
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
in:
Definition
,
Military
,
Cyberwarfare
Cyber manipulation
Revision as of 15:56, 7 December 2012 by
Mdscott
(
talk
|
contribs
)
(Adding categories)
(
diff
)
← Older revision
| Latest revision (diff) | Newer revision → (diff)
Edit
Edit source
View history
Talk (0)
Definition
[
]
Cyber manipulation
(
CyM
) is
“
[f]ollowing
infiltration
, the control of a
system
via its
software
which leaves the
system
intact, then uses the capabilities of the
system
to do damage. For example, using
system
's
software
to turn off power.
”
Advertisement
Follow on IG
TikTok
Join Fan Lab