cyber attack characteristics - Search