Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyberattack

Critical Concepts, Standards, and Techniques in Cyber Forensics
An attack that is launched onto the network so as to gain illegal access to the system.
Published in Chapter:
Digital Terrorism Attack: Types, Effects, and Prevention
Parkavi R. (Thiagarajar College of Engineering, India), Nithya R. (Thiagarajar College of Engineering, India), and Priyadharshini G. (Thiagarajar College of Engineering, India)
Copyright: © 2020 |Pages: 27
DOI: 10.4018/978-1-7998-1558-7.ch005
Abstract
In this rapidly growing era of technology, terrorist organizations do not ultimately depend on weapons, army, bombs, and lethal weapons to inflict terror. As the entire earth is developing at a rapid pace, so do the terrorists. The strategies adopted by them have become cannier and more sinister. In addition to that, they no longer involve in training, making tedious plans, undergoing physical training, and subjecting their allies to physical attacks. Rather, they impose serious threats by attacking their victims by vandalizing the online infrastructure. This can be done conveniently from any part of the globe, thus enabling them to use the dark side of the internet. This chapter focuses on digital terrorism attacks, its impact, and it furnishes certain methods for prevention.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Investigating Cybercrime in Nigeria
Any form of injury done to a network or individual through the internet (e.g., cyber stalking, cyber bullying, and malware).
Full Text Chapter Download: US $37.50 Add to Cart
Indirect Attribution in Cyberspace
An attack over a computer network, usually over the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Forensics of Cybercrimes and the Use of Cyber Forensics Tools to Obtain Digital Evidence
Attack that is launched against one or more specific cyber assets in order to cause disruption or damage.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Cyberbullies and Cyberpunks, Oh My: Examining Cyberbullying Through a Domestic and International Lens
Online behaviors that lead to negative consequences by destroying victims or their properties, stealing information, exposing harm to victims, or spreading adverse information against victims.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding the Relationship Between Cybercrime and Human Behavior Through Criminological Theories and Social Networking Sites
A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberwarfare: War Activities in Cyberspace
An unacceptable and undesirable attempt or assault aimed at stealing, modifying, deleting or damaging data and information carried out by cybercriminals individually or in an organized manner by using one or more computers, networks and systems through unauthorized and unauthenticated access to computer systems.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Crime and Challenges of Securing Nigeria's Cyber-Space Against Criminal Attacks
Is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter compute code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.
Full Text Chapter Download: US $37.50 Add to Cart
The Threat of Cyber Warfare in the SADC Region: The Case of Zimbabwe
Any action taken to undermine the functions of a computer network for a political or national security purpose.
Full Text Chapter Download: US $37.50 Add to Cart
Deep Learning in Instructional Analysis, Design, Development, Implementation, and Evaluation (ADDIE)
The cyberattack is any attempt to expose, alter, disable, destroy, steal, or gain information through unprivileged or unauthorized access to the computer, network systems.
Full Text Chapter Download: US $37.50 Add to Cart
Evolution of Malware in the Digital Transformation Age
An attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Laws in Malaysia
The act of hackers to disrupt or damage a computer network or system.
Full Text Chapter Download: US $37.50 Add to Cart
A Three-Vector Approach to Blind Spots in Cybersecurity
A deliberate exploitation of computer systems, technology-dependent enterprises and networks.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity and Electronic Services Oriented to E-Government in Europe
Any attempt to violate the security perimeter of a logical environment. An attack can focus on gathering information, damaging business processes, exploiting flaws, monitoring targets, interrupting business tasks, extracting value, causing damage to logical or physical assets or using system resources to support attacks against other targets.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberbullying and Internet Safety
A one-time yet serious incident of aggression where the aggressor intended harm and a power imbalance is present. It does not constitute cyberbullying due to its one-off occurrence.
Full Text Chapter Download: US $37.50 Add to Cart
Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges
A cyberattack is an digital destruction launched by cybercriminals using one or more computers and other digital devices against a single or multiple computers or networks.
Full Text Chapter Download: US $37.50 Add to Cart
The Importance of the Human-Centric Approach in Combating Cyber Threats
A form of cyber threat whereby perpetrators aim to create a backdoor in a computer or network system to gain unauthorised access into these systems.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity: What Matters to Consumers – An Exploratory Study
A cyberattack is a deliberate attack on computer systems, a website, or individual computers using a computer. A cyberattack compromises the integrity and/or availability of the computer/system on which the information is stored.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrime and Private Health Data: Review, Current Developments, and Future Trends
A deliberate exploitation of computer systems, technology-dependent enterprises and networks.
Full Text Chapter Download: US $37.50 Add to Cart
Government's Dynamic Approach to Addressing Challenges of Cybersecurity in South Africa
Is a deliberate exploitation of computer systems, technology systems, and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive results that can compromise data. It is an illegal attempt to harm someone’s computer system or the information on it, using the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cyber Security Threats During the COVID-19 Pandemic and Possible Countermeasures
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
Full Text Chapter Download: US $37.50 Add to Cart
Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects
Any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR