• Entry
  • Reader's guide
  • Entries A-Z
  • Subject index

Cyberattacks

  • By: Stephen T. Schroth
  • In: Encyclopedia of Disaster Relief
  • Edited by: K. Bradley Penuel & Matt Statler
  • Subject:Public Health (general), Public Policy (general)

While traditional defenses against crime and terrorism have focused on staving off attacks on humans and brick-and-mortar targets, in recent decades, attacks upon computer systems have become common. Threats to computer systems can destroy data, inconvenience users, and disrupt financial and governmental organizations. Individual users and organizations often spend a great deal of time and money preventing cyberattacks on hardware, software, or data. Some who initiate cyberattacks do so for profit, while others engage in vandalism for thrills or to make political statements. Standard security measures focus on the three-pronged approach emphasizing prevention, detection, and response. While public and private resources are directed toward combating cyberattacks, such efforts often prove inadequate, as law enforcement agencies are often ill-prepared to deal with ever-changing technology and the ...

    • Loading...
    locked icon

    Sign in to access this content

    Get a 30 day FREE TRIAL

    • Watch videos from a variety of sources bringing classroom topics to life
    • Read modern, diverse business cases
    • Explore hundreds of books and reference titles