Cyberattack

A cyberattack (or cyber attack) is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices,[1] or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent.[2] Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack.

A cyberattack may steal, alter, or destroy a specified target by hacking into a private network or otherwise susceptible system.[3] Cyber Attacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations. Legal experts are seeking to limit the use of the term to incidents causing physical damage, distinguishing it from the more routine data breaches and broader hacking activities.[4]

Cyberattacks have become increasingly sophisticated, hazardous,[5] and expensive to recover from.[6]

User behavior analytics and security information and event management can be used to help prevent these attacks.

  1. ^ "Cyber Attack - Glossary". csrc.nist.gov. Retrieved 5 September 2021.
  2. ^ "ISTQB Standard glossary of terms used in Software Testing". Archived from the original on 5 November 2018. Retrieved 8 March 2019.
  3. ^ Lin, Tom C. W. (14 April 2016). "Financial Weapons of War". ssrn.com.
  4. ^ Satter, Raphael (28 March 2017). "What makes a cyberattack? Experts lobby to restrict the term". Retrieved 7 July 2017.
  5. ^ S. Karnouskos: Stuxnet Worm Impact on Industrial Cyber-Physical System Security. In:37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), Melbourne, Australia, 7-10 Nov 2011. Retrieved 20 April 2014.
  6. ^ Cremer F, Sheehan B, Fortmann M, Kia AN, Mullins M, Murphy F, Materne S: Cyber risk and cybersecurity: a systematic review of data availability. Geneva Pap Risk Insur Issues Pract. 2022 Retrieved 4 December 2023

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search