000 | 01541nam a22002057a 4500 | ||
---|---|---|---|
001 | 46950 | ||
003 | OSt | ||
005 | 20240422140300.0 | ||
008 | 240422b |||||||| |||| 00| 0 eng d | ||
100 | _aOOSTHOEK Kris | ||
245 |
_aCyber threat intelligence: _ba product without a process?/ _cKris Oosthoek and Christian Doerr |
||
260 | _c2021 | ||
520 | _aCyber threats have become a permanent threat to society. Over the last few years, accounts of hacking campaigns into public- and private-sector enterprises have drawn significant attention. In 2017, Yahoo announced that three billion user account details were exposed in a hacking operation dating back to 2013. In 2018, Equifax disclosed that malicious actors had penetrated its corporate network and exposed sensitive personal data of 143 million U.S. citizens. The same year, Marriott Hotels declared that the records of 383 million guests were exposed to malicious actors. These breaches descended from state-coordinated hacking campaigns. Cybersecurity breaches cause technical catastrophes, but also have significant ramifications at economic, legal, and individual and personal levels. | ||
598 | _aCYBER THREAT, CYBERSECURITY, NEWARTICLS | ||
650 |
_aCYBER THREAT _xCYBER SECURITY |
||
700 | _aDOERR Christian | ||
773 | _gInternational Journal of Intelligence and Counterintelligence, Volume 34, Number 2, Summer 2021, page: 300-315 | ||
856 |
_uhttps://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062 _zClick here for full text |
||
942 |
_2ddc _cARTICLE _n0 |
||
999 |
_c46950 _d46950 |