In an increasingly connected — hence vulnerable — world, enemies see cyber attacks as highly asymmetric stealth weapons offering huge payoffs relative to cost. Such methods have obvious appeal for terrorist groups and even certain countries with designs on their enemies’ vital systems.
[…]