Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyber-Attack

Handbook of Research on Cyber Crime and Information Privacy
Any attack that use computer, internet, or any digital device.
Published in Chapter:
Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents
Rogério Yukio Iwashita (University of São Paulo, Brazil) and Luiz Camolesi Junior (University of Campinas, Brazil)
Copyright: © 2021 |Pages: 25
DOI: 10.4018/978-1-7998-5728-0.ch024
Abstract
Among the biggest cybercrime or information security challenges, the information security professionals must be up to date with the new risks, cases, and different ways of attacks. Being up to date in this complex and aggressive scenario is a huge challenge and is a necessity to the security professional to fight against the cybercriminals. Additionally, based on this standard of requisites to start an information security program, an immature professional may be confused on the different frameworks used by the industries, mainly ISO/IEC 27000 family, NIST 800-53, NIST Cybersecurity Framework, COBIT, etc. This chapter will help the information security professional to decide where is important to focus efforts, to decide what is feasible and which control does not demand any additional investment. Additionally, this grade helps the InfoSec professionals to compare the information security maturity level within the companies and between the companies, comparing with benchmarks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
The Industry 4.0 for Secure and Smarter Manufacturing
A cyber-attack is an occurrence that has an adverse effect on an organization's operations, assets, or individuals through unauthorized access, disclosure, denial of service (DoS), information manipulation, or any other means. Active mode and passive mode attacks are two types of attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Computing Environments
An attempt by an advisory to breach the security of an information system, file, service or IT asset to gain unauthorized access to its content resulting in having the ability to compromise integrity of the system, file, service or IT asset potentially causing damage or harm to the compromised asset, organization or individual.
Full Text Chapter Download: US $37.50 Add to Cart
Transforming Cities
A malicious attempt to breach a computer network to steal or damage its contents.
Full Text Chapter Download: US $37.50 Add to Cart
The Impact of IoT on Information Warfare
Attacks conducted in cyber-space primarily aimed at disrupting information services or operations, steal information, or making political statements.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
Cyber-attack is a crime performed over the Internet. It may involve an individual or a group to perform malicious activity targeting a person or an organization. Its main aim is to gain access to the personal information to breach the security boundaries. It may include various types of attack like phishing, malware, spamming, XSS, botnets, Socialbots etc.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Threat Ransomware and Marketing to Networked Consumers
An illegal attempt by hacker to target an individual or an enterprise for harm or financial gain.
Full Text Chapter Download: US $37.50 Add to Cart
Information-Cyberspace Operations in Real-World Politics
An attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch a cyber-attack that includes malware, phishing, ransomware, man-in-the-middle attack, or other methods.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR