IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Hacker and Non-Attributed State Actors

Hacker and Non-Attributed State Actors
View Sample PDF
Copyright: 2021
Pages: 30
Source title: Real-Time and Retrospective Analyses of Cyber Security
Source Author(s)/Editor(s): David Anthony Bird (British Computer Society, UK)
DOI: 10.4018/978-1-7998-3979-8.ch003

Purchase

View Hacker and Non-Attributed State Actors on the publisher's website for pricing and purchasing information.

Abstract

Chapter 3 sets the scene by exploring some challenges from both a technical and societal viewpoint and contrasts situations against an undertow of cyber-attacks. This chapter investigates various cases of how vulnerabilities originating from the software supply chain can have catastrophic outcomes when weaknesses slip through the net such as unpatched software or software misconfigurations during an organization's software maintenance regime. Examples are provided of high-profile hacks, security breaches, and cyber-attacks undertaken by hackers suspected of being affiliated to foreign states. These case studies provide various salient contexts as well as examples of threats, vulnerabilities, and their resultant impacts; ultimately, the consequence of flaws that create vulnerabilities occur through misconfigurations or from unpatched software weaknesses.

Related Content

Vikas Sharma, Shiv Mohan Verma, Ankit Srivastava. © 2025. 16 pages.
Pramendra Sahu, Pravin Chandra Singh, Divya Kr, Sujay Vikram Singh, Vishal Kumar Singh, Shailja Bakshi, Kumari Neelam, Pankaj Kumar, Utkarsh Keshari. © 2025. 16 pages.
Ashish Raina. © 2025. 10 pages.
Ashish Raina, Sarita Rani, Gaurav Bathla. © 2025. 16 pages.
Harish Uppilappatta Chennelleri, Dhanya Neelamana Mani. © 2025. 20 pages.
Aleksandar Radic. © 2025. 20 pages.
G. Sowmya, R Sridevi, K. S. Sadasivarao. © 2025. 20 pages.
Body Bottom