Cyber attack: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Add links.)
(Add link.)
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
''Cybersecurity.''
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.




Sometimes written 'cyberattack'.
Sometimes written 'cyberattack'.




Line 10: Line 11:
*[[Business continuity plan]]
*[[Business continuity plan]]
*[[Business impact analysis]]
*[[Business impact analysis]]
*[[Credential stuffing]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security: protecting your business and your clients]]
Line 21: Line 23:
*[[Social engineering]]
*[[Social engineering]]


[[Category:Knowledge_and_information_management]]
[[Category:Accounting,_tax_and_regulation]]
[[Category:Financial_risk_management]]
[[Category:Technology]]

Latest revision as of 13:14, 6 February 2024

Cybersecurity.

A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.


Sometimes written 'cyberattack'.


See also