Cyberattack — Examples of Threats

Abstract

The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Białas A., Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie, Publ. WNT, Warszawa 2007, pp. 10, 33, 43 [Information and services security within modern organizations and probabilities — available in Polish].

  • [2] Committee on National Security Systems (CNSS) Glossary, CNSSI No. 4009, April 2015, pp. 50, 61.

  • [3] Goodman M., Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko tobie, Publ. Helion, Gliwice 2016, pp. 208, 222 [Future Crimes: Everything is Connected, Everyone is Vulnerable — available in Polish].

  • [4] NIST Special Publication 800-39, National Institute of Standard and Technology, Managing Information Security Risk Organization, Mission and Information System View, Information Security, March 2011, pp. B-1.

  • [5] Ransom.Cryptolocker, [online], https://www.symantec.com/security-center/writeup/2013-091122-3112-99 [access 05.09.2019].

  • [6] Shirey R., Internet Security Glossary, IETF 2000, RFC 2828, [online], https://www.rfc-editor.org/rfc/rfc2828.txt [access 18.03.2019].

  • [7] Trend Micro, [online], https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.linux.setag.rpb [access 05.09.2019].

Journal + Issues

Search