Cyber attack: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Add link to 'Cybercrime – A Threat And An Opportunity'.) |
imported>Doug Williamson (Added link to Treasurer's Handbook) |
||
Line 8: | Line 8: | ||
*[[Business impact analysis]] | *[[Business impact analysis]] | ||
*[[Cybercrime – A Threat And An Opportunity]] | *[[Cybercrime – A Threat And An Opportunity]] | ||
*[[Cyber security: protecting your business and your clients]] | |||
*[[Cyber security]] | *[[Cyber security]] | ||
*[[Cyberspace]] | *[[Cyberspace]] |
Revision as of 12:53, 12 November 2015
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.