Soft target
Encyclopedia
Soft target is a military term referring to unarmored/undefended targets needing to be destroyed. For example, a soft target would be an automobile, a house, or assembly of people while a hard target could be a main battle tank
Main battle tank
A main battle tank , also known as a battle tank or universal tank, is a tank that fills the heavy direct fire role of many modern armies. They were originally conceived to replace the light, medium, heavy and super-heavy tanks. Development was spurred onwards in the Cold War with the development...

 or a well defended installation. A soft target can generally be overcome from any direction with typical ordnance
Weapon
A weapon, arm, or armament is a tool or instrument used with the aim of causing damage or harm to living beings or artificial structures or systems...

 in use by line units, while a hard target may necessitate attack from a specific direction, with particular planning, en-masse, by special units or by ordnance made for the purpose. Hardening a soft target can be achieved by addition of armour or use of additional construction, camouflage
Camouflage
Camouflage is a method of concealment that allows an otherwise visible animal, military vehicle, or other object to remain unnoticed, by blending with its environment. Examples include a leopard's spotted coat, the battledress of a modern soldier and a leaf-mimic butterfly...

, mobility, co-location with defenses or another defended location, or even a less humane approach such as utilizing a human shield
Human shield
Human shield is a military and political term describing the deliberate placement of civilians in or around combat targets to deter an enemy from attacking those targets. It may also refer to the use of civilians to literally shield combatants during attacks, by forcing the civilians to march in...

or by placing in a sensitive location like a well-populated city.

In technology security, Soft target is a term used to describe any computers, networks, or entire domains with exploitable vulnerabilities.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK