CYBER ATTACK vs CYBER EXPLOITATION

    Cyber-attack is an act of offense on a computer information systems, computer networks or system infrastructures. Its purpose is destruction, disruption, degradation or denial of services in computer systems. On the other hand, cyber exploitation is an act of manipulation on a system, in which monitoring and controlling related to espionage and spying is happening secretly. These two computer breaches are different in their mission. As a result they also have different outcomes.

            In cyber-attack distraction of computer system or codes can result a huge physical destruction of the target. A system distraction to one of these, for example electricity grid, military communications, banking data can disrupt the very living of everyday people, which are huge. Cyber-exploitations are intended to be secretive, subtle or with any sign of irregular system detection on the targets end. However it’s maliciously performing its tasks, For-example maliciously stealing military secrets, intellectual property, credit card information, etc. without any physical destruction.

      Although the evaluation of these two techniques may need a detailed scenarios, I think cyber-exploitation is more dangerous than cyber-attack. Because the victim entity doesn’t even know what’s happening in its system or how long it may have been going. A Cyber-attack vulnerability period ends when final objectives are achieved, for example destruction of infrastructure or extraction of data. Cyber-exploitation can go forever if it never gets discovered. 

Citation

– Resource used:

Birhane: Reviewed from above source content.