Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Hacker and Non-Attributed State Actors

Hacker and Non-Attributed State Actors
View Sample PDF
Copyright: 2021
Pages: 30
Source title: Real-Time and Retrospective Analyses of Cyber Security
Source Author(s)/Editor(s): David Anthony Bird (British Computer Society, UK)
DOI: 10.4018/978-1-7998-3979-8.ch003


View Hacker and Non-Attributed State Actors on the publisher's website for pricing and purchasing information.


Chapter 3 sets the scene by exploring some challenges from both a technical and societal viewpoint and contrasts situations against an undertow of cyber-attacks. This chapter investigates various cases of how vulnerabilities originating from the software supply chain can have catastrophic outcomes when weaknesses slip through the net such as unpatched software or software misconfigurations during an organization's software maintenance regime. Examples are provided of high-profile hacks, security breaches, and cyber-attacks undertaken by hackers suspected of being affiliated to foreign states. These case studies provide various salient contexts as well as examples of threats, vulnerabilities, and their resultant impacts; ultimately, the consequence of flaws that create vulnerabilities occur through misconfigurations or from unpatched software weaknesses.

Related Content

Nurul Naimah Rose, Aida Shakila Ishak, Nor Hafizan Habib Sultan, Fauziah Ismail, Adi Fahrudin. © 2022. 18 pages.
Kavita Ajit Saptasagar. © 2022. 7 pages.
Sonali Sagar Kharade. © 2022. 9 pages.
Amy Sarah Padayachee, Fumane Portia Khanare, Delin C. Louw, Ntombizandile Gcelu. © 2022. 16 pages.
Munyaradzi Zhou, Cyncia Matsika, Tinashe Gwendolyn Zhou, Wilfreda I. Chawarura. © 2022. 13 pages.
Melanie B. Richards. © 2022. 19 pages.
Ebru Efeoglu, Ay┼če Tuna. © 2022. 17 pages.
Body Bottom