Cyberattack — Examples of Threats

Open access

Abstract

The purpose of this article is to present selected threats that may affect the security of IT systems caused by cyberattacks coming from cyberspace, as well as to prescribe the results that could be caused by the failure to implement security measures to protect information system (IS).

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Białas A. Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie Publ. WNT Warszawa 2007 pp. 10 33 43 [Information and services security within modern organizations and probabilities — available in Polish].

  • [2] Committee on National Security Systems (CNSS) Glossary CNSSI No. 4009 April 2015 pp. 50 61.

  • [3] Goodman M. Zbrodnie przyszłości. Jak cyberprzestępcy korporacje i państwa mogą używać technologii przeciwko tobie Publ. Helion Gliwice 2016 pp. 208 222 [Future Crimes: Everything is Connected Everyone is Vulnerable — available in Polish].

  • [4] NIST Special Publication 800-39 National Institute of Standard and Technology Managing Information Security Risk Organization Mission and Information System View Information Security March 2011 pp. B-1.

  • [5] Ransom.Cryptolocker [online] https://www.symantec.com/security-center/writeup/2013-091122-3112-99 [access 05.09.2019].

  • [6] Shirey R. Internet Security Glossary IETF 2000 RFC 2828 [online] https://www.rfc-editor.org/rfc/rfc2828.txt [access 18.03.2019].

  • [7] Trend Micro [online] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.linux.setag.rpb [access 05.09.2019].

Search
Journal information
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 12 12 6
PDF Downloads 11 11 6