Targeted cyber attacks: how to mitigate the increasing risk

被引:0
|
作者
Bunker G. [1 ]
机构
[1] Clearswift
来源
Network Security | 2020年 / 2020卷 / 01期
关键词
D O I
10.1016/S1353-4858(20)30010-6
中图分类号
学科分类号
摘要
In the past year, it has felt as if cyber security breaches have rarely been out of the press, with more and more reports of organisations and individuals becoming victims of targeted attacks. Sainsbury's, Uber and Argos are just three examples of companies out of more than 100 who fell victim to this summer's Capital One breach.1 This high-profile hack has led to a potential fine of $500m for the financial giant and the hacker in question has been charged with five years’ imprisonment and over £200,000 in fines. © 2020 Elsevier Ltd
引用
收藏
页码:17 / 19
页数:2
相关论文
共 50 条
  • [31] Risk Assessment for Cyber Attacks in Feeder Automation System
    Dai, Qiangsheng
    Shi, Libao
    Ni, Yixin
    2018 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2018,
  • [32] Geometric Correlations Mitigate the Extreme Vulnerability of Multiplex Networks against Targeted Attacks
    Kleineberg, Kaj-Kolja
    Buzna, Lubos
    Papadopoulos, Fragkiskos
    Boguna, Marian
    Serrano, M. Angeles
    PHYSICAL REVIEW LETTERS, 2017, 118 (21)
  • [33] Cyber attacks on the energy industry: How critical infrastructures are attacked
    Trost, Rüdiger
    BWK- Energie-Fachmagazin, 2019, 71 (09): : 53 - 54
  • [34] How to build a vulnerability benchmark to overcome cyber security attacks
    Akram, Junaid
    Ping, Luo
    IET INFORMATION SECURITY, 2020, 14 (01) : 60 - 71
  • [35] A Game-Theoretic Control Approach to Mitigate Cyber Switching Attacks in Smart Grid Systems
    Farraj, Abdallah K.
    Hammad, Eman M.
    Al Daoud, Ashraf
    Kundur, Deepa
    2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 958 - 963
  • [36] How financial services firms can mitigate the next wave of attacks
    Locatelli M.
    Network Security, 2021, 2021 (10) : 12 - 14
  • [37] A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
    Agrafiotis, Ioannis
    Nurse, Jason R. C.
    Goldsmith, Michael
    Creese, Sadie
    Upton, David
    JOURNAL OF CYBERSECURITY, 2018, 4 (01):
  • [39] US GAO says control systems at risk of cyber attacks
    不详
    CONTROL ENGINEERING, 2004, 51 (05) : 11 - 12
  • [40] CyMRisk: An Approach for Computing Mission Risk due to Cyber Attacks
    Llanso, Thomas
    Klatt, Eric
    2014 8TH ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2014, : 1 - 7