Targeted cyber attacks: how to mitigate the increasing risk

被引:0
|
作者
Bunker G. [1 ]
机构
[1] Clearswift
来源
Network Security | 2020年 / 2020卷 / 01期
关键词
D O I
10.1016/S1353-4858(20)30010-6
中图分类号
学科分类号
摘要
In the past year, it has felt as if cyber security breaches have rarely been out of the press, with more and more reports of organisations and individuals becoming victims of targeted attacks. Sainsbury's, Uber and Argos are just three examples of companies out of more than 100 who fell victim to this summer's Capital One breach.1 This high-profile hack has led to a potential fine of $500m for the financial giant and the hacker in question has been charged with five years’ imprisonment and over £200,000 in fines. © 2020 Elsevier Ltd
引用
收藏
页码:17 / 19
页数:2
相关论文
共 50 条
  • [41] A Risk-Assessment Model for Cyber Attacks on Information Systems
    Patel, Sandip
    Zaveri, Jigish
    JOURNAL OF COMPUTERS, 2010, 5 (03) : 352 - 359
  • [42] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Adam M. Bossler
    American Journal of Criminal Justice, 2021, 46 : 911 - 934
  • [43] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Bossler, Adam M.
    AMERICAN JOURNAL OF CRIMINAL JUSTICE, 2021, 46 (06) : 911 - 934
  • [44] How to Detect Cyber-attacks in Unmanned Aerial Vehicles Network?
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Messous, Mohamed-Ayoub
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [45] Increasing Potassium Intake May Help Mitigate Cardiovascular Risk
    Wohlert, Noah
    AMERICAN FAMILY PHYSICIAN, 2015, 92 (06) : 430 - 430
  • [46] Network slicing as 6G security mechanism to mitigate cyber-attacks: the RIGOUROUS approach
    Escolar, Antonio Matencio
    Bernabe, Jorge Bernal
    Calero, Jose Maria Alcaraz
    Wang, Qi
    Skarmeta, Antonio
    2024 IEEE 10TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT 2024, 2024, : 387 - 392
  • [47] Mitigating the Risk of Advanced Cyber Attacks: The Role of Quality, Covertness and Intensity of Use of Cyber Weapons
    Gilad, Amitai
    Tishler, Asher
    DEFENCE AND PEACE ECONOMICS, 2023, 34 (06) : 726 - 746
  • [48] Quantitative Risk Assessment of Cyber-Physical System for Cyber-attacks in Distribution Network
    Zhang Y.
    Ni M.
    Sun Y.
    Li M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (21): : 12 - 22and33
  • [49] Secure Virtual Network Embedding to Mitigate the Risk of Covert Channel Attacks
    Wang, Zhiming
    Wu, Jiangxing
    Guo, Zehua
    Cheng, Guozhen
    Hu, Hongchao
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [50] Foiling Cyber Attacks
    Guitton, Clement
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,