Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Island Hopping

Real-Time and Retrospective Analyses of Cyber Security
This involves the subversion of web sites from one organization to redirect them to a malicious site hosting exploit kits used to find vulnerabilities in a bid to launch attacks against users of other organizations who visited the site; effectively, this acts as Watering Holes.
Published in Chapter:
Hacker and Non-Attributed State Actors
Copyright: © 2021 |Pages: 30
DOI: 10.4018/978-1-7998-3979-8.ch003
Abstract
Chapter 3 sets the scene by exploring some challenges from both a technical and societal viewpoint and contrasts situations against an undertow of cyber-attacks. This chapter investigates various cases of how vulnerabilities originating from the software supply chain can have catastrophic outcomes when weaknesses slip through the net such as unpatched software or software misconfigurations during an organization's software maintenance regime. Examples are provided of high-profile hacks, security breaches, and cyber-attacks undertaken by hackers suspected of being affiliated to foreign states. These case studies provide various salient contexts as well as examples of threats, vulnerabilities, and their resultant impacts; ultimately, the consequence of flaws that create vulnerabilities occur through misconfigurations or from unpatched software weaknesses.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR