Targeted cyber attacks: how to mitigate the increasing risk

被引:0
|
作者
Bunker G. [1 ]
机构
[1] Clearswift
来源
Network Security | 2020年 / 2020卷 / 01期
关键词
D O I
10.1016/S1353-4858(20)30010-6
中图分类号
学科分类号
摘要
In the past year, it has felt as if cyber security breaches have rarely been out of the press, with more and more reports of organisations and individuals becoming victims of targeted attacks. Sainsbury's, Uber and Argos are just three examples of companies out of more than 100 who fell victim to this summer's Capital One breach.1 This high-profile hack has led to a potential fine of $500m for the financial giant and the hacker in question has been charged with five years’ imprisonment and over £200,000 in fines. © 2020 Elsevier Ltd
引用
收藏
页码:17 / 19
页数:2
相关论文
共 50 条
  • [1] How to manage the risk of cyber attacks
    Promislow, Ruth
    Canadian Mining Journal, 2022, 143 (04):
  • [2] On the Adaptive Protection of Microgrids: A Review on How to Mitigate Cyber Attacks and Communication Failures
    Habib, Hany F.
    Lashway, Christopher R.
    Mohammed, Osama A.
    2017 IEEE INDUSTRY APPLICATIONS SOCIETY ANNUAL MEETING, 2017,
  • [3] Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities
    Awan, Jawad Hussain
    Memon, Shahzad
    Memon, Sheeraz
    Pathan, Kamran Taj
    Arijo, Niaz Hussain
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2018, 37 (02) : 359 - 366
  • [4] Turkish national cyber-firewall to mitigate countrywide cyber-attacks
    Sari, Arif
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 128 - 144
  • [5] Present Cyber Threat Management (Methodologies to mitigate evolving cyber-attacks)
    Mawudor, Bright Gameli
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 115 - 121
  • [6] Controlling user access with scripting to mitigate cyber-attacks
    Nyarko-Boateng, Owusu
    Nti, Isaac Kofi
    Mensah, Anastasia Akyamaa
    Gyamfi, Emmanuel Kojo
    SCIENTIFIC AFRICAN, 2024, 26
  • [7] Cyber Attacks and How to Buy Time
    Folini, Christian
    ITNOW, 2019, 61 (04): : 40 - 41
  • [8] Detection of Cyber Attacks to Mitigate Their Impacts on the Manipulated EV Charging Prices
    Akbarian, Amirhossein
    Bahrami, Mahdi
    Ahmadi, Mehdi
    Vakilian, Mehdi
    Lehtonen, Matti
    IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, 2024, 10 (04): : 8881 - 8892
  • [9] Federated Access to Cyber Observables for Detection of Targeted Attacks
    Atighetchi, Michael
    Griffith, John
    Emmons, Ian
    Mankins, David
    Guidorizzi, Richard
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 60 - 66
  • [10] How to Protect a Hospital Against Cyber Attacks
    Guinet, Alain
    HEALTH CARE SYSTEMS ENGINEERING, 2017, 210 : 3 - 16