Cyber attack: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson m (Add header) |
(Add link.) |
||
Line 5: | Line 5: | ||
Sometimes written 'cyberattack'. | Sometimes written 'cyberattack'. | ||
Line 12: | Line 11: | ||
*[[Business continuity plan]] | *[[Business continuity plan]] | ||
*[[Business impact analysis]] | *[[Business impact analysis]] | ||
*[[Credential stuffing]] | |||
*[[Cybercrime – A Threat And An Opportunity]] | *[[Cybercrime – A Threat And An Opportunity]] | ||
*[[Cyber security: protecting your business and your clients]] | *[[Cyber security: protecting your business and your clients]] | ||
Line 23: | Line 23: | ||
*[[Social engineering]] | *[[Social engineering]] | ||
[[Category: | [[Category:Accounting,_tax_and_regulation]] | ||
Latest revision as of 13:14, 6 February 2024
Cybersecurity.
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.
Sometimes written 'cyberattack'.
See also
- BCM
- Business continuity plan
- Business impact analysis
- Credential stuffing
- Cybercrime – A Threat And An Opportunity
- Cyber security: protecting your business and your clients
- Cyber security
- Cyberspace
- DDoS
- Hotspot sniffing
- Man in the middle
- National Cyber Security Centre
- Sidejacking
- Social engineering