Cyber threat intelligence: a product without a process?/ Kris Oosthoek and Christian Doerr
Material type: TextPublication details: 2021Subject(s): Online resources: In: International Journal of Intelligence and Counterintelligence, Volume 34, Number 2, Summer 2021, page: 300-315Summary: Cyber threats have become a permanent threat to society. Over the last few years, accounts of hacking campaigns into public- and private-sector enterprises have drawn significant attention. In 2017, Yahoo announced that three billion user account details were exposed in a hacking operation dating back to 2013. In 2018, Equifax disclosed that malicious actors had penetrated its corporate network and exposed sensitive personal data of 143 million U.S. citizens. The same year, Marriott Hotels declared that the records of 383 million guests were exposed to malicious actors. These breaches descended from state-coordinated hacking campaigns. Cybersecurity breaches cause technical catastrophes, but also have significant ramifications at economic, legal, and individual and personal levels.Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | CYBER THREAT (Browse shelf(Opens below)) | Not for loan |
Cyber threats have become a permanent threat to society. Over the last few years, accounts of hacking campaigns into public- and private-sector enterprises have drawn significant attention. In 2017, Yahoo announced that three billion user account details were exposed in a hacking operation dating back to 2013. In 2018, Equifax disclosed that malicious actors had penetrated its corporate network and exposed sensitive personal data of 143 million U.S. citizens. The same year, Marriott Hotels declared that the records of 383 million guests were exposed to malicious actors. These breaches descended from state-coordinated hacking campaigns. Cybersecurity breaches cause technical catastrophes, but also have significant ramifications at economic, legal, and individual and personal levels.
CYBER THREAT, CYBERSECURITY, NEWARTICLS
There are no comments on this title.