Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyber Attacks

Handbook of Research on Digital Violence and Discrimination Studies
They are attacks made in the virtual environment to obtain passwords and user information of individuals.
Published in Chapter:
Information Ethics in the Context of Current Developments
Yusuf Esmer (Faculty of Applied Sciences, Bayburt University, Turkey) and Ayşe Nihan Arıbaş (Vocational School of Health Services, Aksaray University, Turkey)
DOI: 10.4018/978-1-7998-9187-1.ch030
Abstract
The emergence of globalization due to information technologies and the changes and/or developments brought about by globalization require organizations to have more knowledge about ethics and therefore to be more interested in this issue. The use of information and communication technologies in organizations in accordance with ethical values is considered important in terms of the integrity, functioning, and efficiency of both employees and organizations. Individuals, managers, organizations, and researchers have important duties in the field of information ethics in order to prevent the making of difficult mistakes that will adversely affect individuals and organizations during the use of information technologies. In this context, information ethics has been examined in this study in the context of recent developments all over the world, especially the developments in the global COVID-19 pandemic process.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Proposals to Win the Battle Against Cyber Crime
There are a huge number of cyber threats and their behavior is difficult to early detecting; hence difficult to restrict in the early phases of the cyber-attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Attacks on Critical Infrastructure: Review and Challenges
Cyber attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.
Full Text Chapter Download: US $37.50 Add to Cart
AI-Based Cyber Defense for More Secure Cyberspace
Any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR