Targeted cyber attacks: how to mitigate the increasing risk

被引:0
|
作者
Bunker G. [1 ]
机构
[1] Clearswift
来源
Network Security | 2020年 / 2020卷 / 01期
关键词
D O I
10.1016/S1353-4858(20)30010-6
中图分类号
学科分类号
摘要
In the past year, it has felt as if cyber security breaches have rarely been out of the press, with more and more reports of organisations and individuals becoming victims of targeted attacks. Sainsbury's, Uber and Argos are just three examples of companies out of more than 100 who fell victim to this summer's Capital One breach.1 This high-profile hack has led to a potential fine of $500m for the financial giant and the hacker in question has been charged with five years’ imprisonment and over £200,000 in fines. © 2020 Elsevier Ltd
引用
收藏
页码:17 / 19
页数:2
相关论文
共 50 条
  • [21] Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
    Paradise A.
    Shabtai A.
    Puzis R.
    Elyashar A.
    Elovici Y.
    Roshandel M.
    Peylo C.
    Paradise, Abigail (abigailp@post.bgu.ac.il), 1600, Institute of Electrical and Electronics Engineers Inc., United States (04): : 65 - 79
  • [22] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [23] High-Speed Forensic Technology Against Targeted Cyber Attacks
    Unno, Yuki
    Oikawa, Takanori
    Furukawa, Kazuyoshi
    Morinaga, Masanobu
    Takenaka, Masahiko
    Izu, Tetsuya
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 946 - 946
  • [24] Stealthy Targeted Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Krames, Marcel
    Zhang, Ping
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3462 - 3467
  • [25] MITIGATE: a dynamic supply chain cyber risk assessment methodology
    Stefan Schauer
    Nineta Polemi
    Haralambos Mouratidis
    Journal of Transportation Security, 2019, 12 : 1 - 35
  • [26] Stealthy targeted local covert attacks on cyber-physical systems☆
    Mikhaylenko, Dina
    Zhang, Ping
    AUTOMATICA, 2025, 173
  • [27] Examining How Targeted Cyber Attacks on Critical Supply Chain Networks Can Lead to Economic Collapse and Civil Unrest
    Squillace, Joseph
    Cappella, Justice
    SOUTHEASTCON 2024, 2024, : 1482 - 1489
  • [28] Mitigate software obsolescence and cyber risk using application virtualization
    Heagney, Christopher P.
    Walker, Lance J.
    EE: Evaluation Engineering, 2018, 57 (12):
  • [29] The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment
    Hartmann, Kim
    Steup, Christoph
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [30] Risk assessment for physical and cyber attacks on critical infrastructures
    Depoy, J.
    Phelan, J.
    Sholander, P.
    Smith, B.
    Varnado, G. B.
    Wyss, G.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1961 - 1969