Jump to content

Talk:Night Dragon Operation

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by DecorumForum125 (talk | contribs) at 19:29, 3 October 2022 (Assessment (Stub/Low): Computer Security (Rater)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

WikiProject iconComputer Security: Computing Stub‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StubThis article has been rated as Stub-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Answer question about Same-origin_policy
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

Seems to be little more than a conspiracy theory (in the most pejorative sense of that term) to me. What I'm reading here is "there are cyber attacks on xyz targets and they all follow the same pattern - first they look for vulnerabilities, then they use those vulnerabilities to get inside the system, then they dig around and figure out how to use those vulnerabilities, finally they unleash their attack". And that similarity in style obviously indicates that these are all coming from the same source. Which would be fine - except that any other model of getting into a system has already been tried and is now easily detected. Any serious attack on a system now MUST follow the "rules" or it'll get detected. (Well, at least until somebody figures out a way to circumvent the rules in a new and interesting way). — Preceding unsigned comment added by 86.138.235.131 (talk) 00:38, 11 April 2018 (UTC)[reply]