@article {846, title = {Cyber-Attack Attributes}, journal = {Technology Innovation Management Review}, volume = {4}, year = {2014}, month = {11/2014}, pages = {22-27}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Cyber-attacks threaten our ability to use the Internet safely, productively, and creatively worldwide and are at the core of many security concerns. The concept of cyber-attacks, however, remains underdeveloped in the academic literature. To advance theory, design and operate databases to support scholarly research, perform empirical observations, and compare different types of cyber-attacks, it is necessary to first clarify the attributes of the {\textquotedblleft}concept of cyber-attack{\textquotedblright}. In this article, attributes of cyber-attacks are identified by examining definitions of cyber-attacks from the literature and information on ten high-profile attacks. Although the article will be of interest to a broad community, it will be of particular interest to senior executives, government contractors, and researchers interested in contributing to the development of an interdisciplinary and global theory of cybersecurity. }, keywords = {attack characteristics, attributes, cyber-attack, cybersecurity}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/846}, url = {http://timreview.ca/article/846}, author = {Mehdi Kadivar} }