The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Hacker and Non-Attributed State Actors
Abstract
Chapter 3 sets the scene by exploring some challenges from both a technical and societal viewpoint and contrasts situations against an undertow of cyber-attacks. This chapter investigates various cases of how vulnerabilities originating from the software supply chain can have catastrophic outcomes when weaknesses slip through the net such as unpatched software or software misconfigurations during an organization's software maintenance regime. Examples are provided of high-profile hacks, security breaches, and cyber-attacks undertaken by hackers suspected of being affiliated to foreign states. These case studies provide various salient contexts as well as examples of threats, vulnerabilities, and their resultant impacts; ultimately, the consequence of flaws that create vulnerabilities occur through misconfigurations or from unpatched software weaknesses.
Related Content
Tamara Leigh Wandel.
© 2023.
22 pages.
|
Berceste Gülçin Özdemir.
© 2023.
10 pages.
|
Shalini Ramdeo, Riann Singh.
© 2023.
16 pages.
|
Umut Çıvgın.
© 2023.
19 pages.
|
Kadriye Özyazıcı.
© 2023.
20 pages.
|
Desmond Onyemechi Okocha, Sienne Ozioma Okpor.
© 2023.
12 pages.
|
Nor Hazlina Hashim, Muhammad Emeer Nor Azhar, Marshina Juliza Mohd Hasim, Zaridah Abdullah.
© 2023.
16 pages.
|
|
|