Cyber attack: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Link with Social engineering page.) |
imported>Doug Williamson m (Add header) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
''Cybersecurity.'' | |||
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information. | A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information. | ||
Line 15: | Line 17: | ||
*[[Cyberspace]] | *[[Cyberspace]] | ||
*[[DDoS]] | *[[DDoS]] | ||
*[[Hotspot sniffing]] | |||
*[[Man in the middle]] | |||
*[[National Cyber Security Centre]] | *[[National Cyber Security Centre]] | ||
*[[Sidejacking]] | |||
*[[Social engineering]] | *[[Social engineering]] | ||
[[Category:Knowledge_and_information_management]] | |||
[[Category:Financial_risk_management]] | |||
[[Category:Technology]] |
Latest revision as of 10:28, 6 February 2019
Cybersecurity.
A cyber attack is an attack, via cyberspace, targeting an organisation's use of cyberspace for the purpose of disrupting, disabling, destroying or maliciously controlling a computing environment / infrastructure; or destroying the integrity of the data or stealing controlled information.
Sometimes written 'cyberattack'.