Cyber attack: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Link with Social engineering page.) |
(Add link.) |
||
(3 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
''Cybersecurity.'' | |||
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information. | A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information. | ||
Sometimes written 'cyberattack'. | Sometimes written 'cyberattack'. | ||
Line 10: | Line 11: | ||
*[[Business continuity plan]] | *[[Business continuity plan]] | ||
*[[Business impact analysis]] | *[[Business impact analysis]] | ||
*[[Credential stuffing]] | |||
*[[Cybercrime – A Threat And An Opportunity]] | *[[Cybercrime – A Threat And An Opportunity]] | ||
*[[Cyber security: protecting your business and your clients]] | *[[Cyber security: protecting your business and your clients]] | ||
Line 15: | Line 17: | ||
*[[Cyberspace]] | *[[Cyberspace]] | ||
*[[DDoS]] | *[[DDoS]] | ||
*[[Hotspot sniffing]] | |||
*[[Man in the middle]] | |||
*[[National Cyber Security Centre]] | *[[National Cyber Security Centre]] | ||
*[[Sidejacking]] | |||
*[[Social engineering]] | *[[Social engineering]] | ||
[[Category:Accounting,_tax_and_regulation]] |
Latest revision as of 13:14, 6 February 2024
Cybersecurity.
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.
Sometimes written 'cyberattack'.
See also
- BCM
- Business continuity plan
- Business impact analysis
- Credential stuffing
- Cybercrime – A Threat And An Opportunity
- Cyber security: protecting your business and your clients
- Cyber security
- Cyberspace
- DDoS
- Hotspot sniffing
- Man in the middle
- National Cyber Security Centre
- Sidejacking
- Social engineering