2014
DOI: 10.22215/timreview846
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attack Attributes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 2 publications
0
2
0
1
Order By: Relevance
“…Um ataque é uma tentativa de destruir, expor, alterar, desabilitar, roubar ou ganhar acesso não autorizado ou fazer uso não autorizado de qualquer coisa que possua valor para a organizac ¸ão [ISO, 2009]. Todo ataque possui: uma motivac ¸ão, atores e um alvo [Kadivar, 2014], a motivac ¸ão do porque quer utilizar o ataque, no mínimo dois atores envolvidos, atacante e vítima, e uma vulnerabilidade a ser explorada.…”
Section: Ataquesunclassified
“…Um ataque é uma tentativa de destruir, expor, alterar, desabilitar, roubar ou ganhar acesso não autorizado ou fazer uso não autorizado de qualquer coisa que possua valor para a organizac ¸ão [ISO, 2009]. Todo ataque possui: uma motivac ¸ão, atores e um alvo [Kadivar, 2014], a motivac ¸ão do porque quer utilizar o ataque, no mínimo dois atores envolvidos, atacante e vítima, e uma vulnerabilidade a ser explorada.…”
Section: Ataquesunclassified
“…Researchers are learning more about cyber-attacks and cyber-attackers (e.g., Kadivar, 2014;Adegboyega, 2015), including the entities behind prominent attacks, their motivations, their tools and technologies, and the complex innovation ecosystems that produce attacker tools and technologies. Knowledge about adversaries enables designers of critical infrastructures to make better decisions about cybersecurity defences and enables a broader range of responses to threats.…”
Section: Know Your Adversariesmentioning
confidence: 99%
“…Attackers usually have a deliberate and malicious intent and may involve the criminals taking advantage of flaws in software code, using tricks to get around antivirus tools, and or exploiting unsuspecting users into divulging sensitive information [10], [11]. Often launched by isolated amateurs, or criminals that belong to often well-structured organizations, with money, motivation, and an agenda, such attacks are frequently designed to temporarily or indefinitely disrupt services of a host connected to the internet or simply grind institutional systems to a halt [4], [8].…”
mentioning
confidence: 99%