Cyber attack: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Added link to Treasurer's Handbook)
(Add link.)
 
(7 intermediate revisions by one other user not shown)
Line 1: Line 1:
''Cybersecurity.''
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.


Sometimes written 'cyberattack'.




Line 7: Line 11:
*[[Business continuity plan]]
*[[Business continuity plan]]
*[[Business impact analysis]]
*[[Business impact analysis]]
*[[Credential stuffing]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security]]
*[[Cyber security]]
*[[Cyberspace]]
*[[Cyberspace]]
*[[DDoS]]
*[[Hotspot sniffing]]
*[[Man in the middle]]
*[[National Cyber Security Centre]]
*[[Sidejacking]]
*[[Social engineering]]
[[Category:Accounting,_tax_and_regulation]]

Latest revision as of 13:14, 6 February 2024

Cybersecurity.

A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.


Sometimes written 'cyberattack'.


See also