Cyber attack: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
m (Add header)
(Add link.)
 
Line 5: Line 5:


Sometimes written 'cyberattack'.
Sometimes written 'cyberattack'.




Line 12: Line 11:
*[[Business continuity plan]]
*[[Business continuity plan]]
*[[Business impact analysis]]
*[[Business impact analysis]]
*[[Credential stuffing]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
Line 23: Line 23:
*[[Social engineering]]
*[[Social engineering]]


[[Category:Knowledge_and_information_management]]
[[Category:Accounting,_tax_and_regulation]]
[[Category:Financial_risk_management]]
[[Category:Technology]]

Latest revision as of 13:14, 6 February 2024

Cybersecurity.

A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.


Sometimes written 'cyberattack'.


See also