Cyber attack: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Create the page. Source: FSA, HMT and Bank of England, 2012, Resilience Benchmarking Key Terms.)
 
imported>Doug Williamson
m (Add header)
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
''Cybersecurity.''
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.
Sometimes written 'cyberattack'.




Line 7: Line 12:
*[[Business continuity plan]]
*[[Business continuity plan]]
*[[Business impact analysis]]
*[[Business impact analysis]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cyber security]]
*[[Cyber security]]
*[[Cyber space]]
*[[Cyberspace]]
*[[DDoS]]
*[[Hotspot sniffing]]
*[[Man in the middle]]
*[[National Cyber Security Centre]]
*[[Sidejacking]]
*[[Social engineering]]
 
[[Category:Knowledge_and_information_management]]
[[Category:Financial_risk_management]]
[[Category:Technology]]

Latest revision as of 10:28, 6 February 2019

Cybersecurity.

A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.


Sometimes written 'cyberattack'.


See also