Cyber attack: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Change links.) |
imported>Doug Williamson (Add link to 'Cybercrime – A Threat And An Opportunity'.) |
||
Line 7: | Line 7: | ||
*[[Business continuity plan]] | *[[Business continuity plan]] | ||
*[[Business impact analysis]] | *[[Business impact analysis]] | ||
*[[Cybercrime – A Threat And An Opportunity]] | |||
*[[Cyber security]] | *[[Cyber security]] | ||
*[[Cyberspace]] | *[[Cyberspace]] |
Revision as of 10:49, 5 August 2015
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.