2020
DOI: 10.1016/s1353-4858(20)30010-6
|View full text |Cite
|
Sign up to set email alerts
|

Targeted cyber attacks: how to mitigate the increasing risk

Abstract: In the past year, it has felt as if cyber security breaches have rarely been out of the press, with more and more reports of organisations and individuals becoming victims of targeted attacks. Sainsbury's, Uber and Argos are just three examples of companies out of more than 100 who fell victim to this summer's Capital One breach. 1 This high-profile hack has led to a potential fine of $500m for the financial giant and the hacker in question has been charged with five years’ imprisonment and over £200,000 in fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In the case of attack detection, we move from peacetime into attack time and create a set of operations to address and mitigate the attack by using programmable change policies in the network such as traffic redirection IP and reputation activating access control list. An attack mitigation system is the best solution to protect online services from emerging cyber-attacks [39,40]. Once the threat of leaks saturation has been removed, the traffic is diverted back to the enterprise, and if necessary, attack traffic can be mitigated.…”
Section: Sdn-based Multilayer Self-defense Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…In the case of attack detection, we move from peacetime into attack time and create a set of operations to address and mitigate the attack by using programmable change policies in the network such as traffic redirection IP and reputation activating access control list. An attack mitigation system is the best solution to protect online services from emerging cyber-attacks [39,40]. Once the threat of leaks saturation has been removed, the traffic is diverted back to the enterprise, and if necessary, attack traffic can be mitigated.…”
Section: Sdn-based Multilayer Self-defense Systemmentioning
confidence: 99%
“…( 1), ( 2) and (3). Accuracy is deemed to be perfect if it is in the range of 90% to 100% [26,27,30,[37][38][39][40][41]. TP represents true positive cases when the SVM classifier detects malicious traffic correctly.…”
Section: Sdn-based Multilayer Self-defense Systemmentioning
confidence: 99%
“…Of course, there are multiple ways of harming a business, but the focus remains on the preventing side. Bunker (2020) supports that education about threat mitigation, precautions and investment in technology that is up to date and can offer protection against cyber-attacks, are the initial and most important steps for a business and its employees. While Warren and Hutchinson (2000) propose the use of encryption in accordance with security standards, access control points, proper training on computer security systems, and lastly raising awareness among employees Proceedings of the International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, March 7-10, 2022 regarding potential risks.…”
Section: Warehousing and Steps Towards Protectionmentioning
confidence: 87%
“…The rapid development of information technology is making possible the increased exchange of information among different business partners (Warren and Hutchinson, 2000) and the supply chain management systems do not fail to fall under the same exchange, as they are dependent on electronic systems. The more international and widespread the commercial exchanges of a company, the higher the risk of being attacked by hackers (Koike et al, 2005;Bunker, 2020). In other words, global interconnectivity led to an increase in cyberthreats (Huang and Chiang, 2021).…”
Section: Introduction To Cyber Attacksmentioning
confidence: 99%