Cyber Crime and Cyber Terrorism


party email provider. The hackers were able to access the payment details of



Download 5,67 Mb.
Pdf ko'rish
bet230/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   226   227   228   229   230   231   232   233   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak


party email provider. The hackers were able to access the payment details of 
5000 customers who had previously shopped on its website. Lush did not fully 
meet industry standards relating to card payment security and faced a potential 
fine of 
£
500,000 from The Information Commissioner’s Office.
These incidents and many more like them demonstrate the multitude and variety of 
risks faced by organizations today not only from direct losses from the event itself, 
but from the risks associated to impact upon reputation (requiring a structured and 
often costly PR response) and from increased fines and claims for damages.
THE CYBER THREAT
The cyber threat for organizations comes in a variety of shapes and sizes and depen-
dent upon who they are, they may be seen as a primary target, as collateral damage 
or merely as a “playground” in which the cyber-infant hones their “Hacking” skills. 
These threats can include: Hacktivism, theft of IP (intellectual property), Cyber-
stalking, Extortion, virus dissemination, identity theft, vandalism, and fraud. Many 
businesses could also find themselves unwittingly playing a part in attacks on other 
computer networks as they become “infected” by tools which enable an attacker 
to take command and control over their computers and use them at their will in a 
“Distributed Denial of Service” (DDOS) attack on another organization or critical 
infrastructure.
Stanley Konter, CEO of Savannah’s Sabre Technologies once stated “The prob-
lem has gotten more prevalent with always-on, high-speed internet access. Attackers 
are always out there looking for that type of computer.” He was referring to the fact 
that computers are often left switched on and connected to the internet, even when 
not in use and this connection can be used both ways by people wishing to do us 
harm. These threats range between state-sponsored terrorists looking to disrupt na-
tional infrastructures through to individuals and groups of individuals who are doing 
it for “lulz” (slang for the term “for laughs”).



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   226   227   228   229   230   231   232   233   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish