Digital Security Strategy

Digital Security Strategy

Copyright: © 2022 |Pages: 14
DOI: 10.4018/978-1-7998-8036-3.ch020
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs. The typical targets of cyberattacks are then considered, followed by a discussion about how to prevent cybercrime. The chapter next reviews digital security indicators that can provide valuable information about cybercrime and cyberattacks. After this, the chapter discusses cyberwar, which involves cyberattacks not just used against individuals and companies, but against entire states. The chapter concludes by advancing a digital security strategy that can be used in the 21st century.
Chapter Preview
Top

Types Of Cyberattacks

To achieve the goal of accessing or disabling computer networks, cybercriminals use several different technical methods. New methods are always being developed, and some categories overlap, but the following are some of the most popular:

Key Terms in this Chapter

Distributed Denial-of-Service: A form of cyberattack that aims to make a machine or network unavailable to intended users.

Cyberbullying: A form of bullying that occurs through electronic communications, such as messages on social media.

Cyberwar: The use of digital attacks directed at a state that cause harm comparable to that of actual war.

Identity theft: The use of another person’s personally identifiable information (e.g., name, social security number, credit card number) to commit a crime.

Social engineering: A form of cyberattack that involves psychologically manipulating people into providing sensitive information (e.g., usernames, passwords, credit card numbers).

General Data Protection Regulation: An EU regulation concerning data protection and privacy for individuals and organizations within the EU and the European Economic Area.

Phishing: A form of cyberattack that aims at obtaining sensitive information (e.g., usernames, passwords, credit card numbers) by the impersonation of trustworthy entities.

Malware: A form of cyberattack involving software designed to damage a computer or network.

Complete Chapter List

Search this Book:
Reset