http://www.w3.org/ns/prov#value | - When initiated the logic bomb would then take whatever action it was programmed to, including destroying data or undermining critical systems. ?? Typical Scope of a Cyber ThreatWe all know what guns and tanks do, they shoot and blow things up.
|