The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Hacker and Non-Attributed State Actors
Abstract
Chapter 3 sets the scene by exploring some challenges from both a technical and societal viewpoint and contrasts situations against an undertow of cyber-attacks. This chapter investigates various cases of how vulnerabilities originating from the software supply chain can have catastrophic outcomes when weaknesses slip through the net such as unpatched software or software misconfigurations during an organization's software maintenance regime. Examples are provided of high-profile hacks, security breaches, and cyber-attacks undertaken by hackers suspected of being affiliated to foreign states. These case studies provide various salient contexts as well as examples of threats, vulnerabilities, and their resultant impacts; ultimately, the consequence of flaws that create vulnerabilities occur through misconfigurations or from unpatched software weaknesses.
Related Content
Vikas Sharma, Shiv Mohan Verma, Ankit Srivastava.
© 2025.
16 pages.
|
Pramendra Sahu, Pravin Chandra Singh, Divya Kr, Sujay Vikram Singh, Vishal Kumar Singh, Shailja Bakshi, Kumari Neelam, Pankaj Kumar, Utkarsh Keshari.
© 2025.
16 pages.
|
Ashish Raina.
© 2025.
10 pages.
|
Ashish Raina, Sarita Rani, Gaurav Bathla.
© 2025.
16 pages.
|
Harish Uppilappatta Chennelleri, Dhanya Neelamana Mani.
© 2025.
20 pages.
|
Aleksandar Radic.
© 2025.
20 pages.
|
G. Sowmya, R Sridevi, K. S. Sadasivarao.
© 2025.
20 pages.
|
|
|