Entry
Reader's guide
Entries A-Z
Subject index
Cyberattacks
While traditional defenses against crime and terrorism have focused on staving off attacks on humans and brick-and-mortar targets, in recent decades, attacks upon computer systems have become common. Threats to computer systems can destroy data, inconvenience users, and disrupt financial and governmental organizations. Individual users and organizations often spend a great deal of time and money preventing cyberattacks on hardware, software, or data. Some who initiate cyberattacks do so for profit, while others engage in vandalism for thrills or to make political statements. Standard security measures focus on the three-pronged approach emphasizing prevention, detection, and response. While public and private resources are directed toward combating cyberattacks, such efforts often prove inadequate, as law enforcement agencies are often ill-prepared to deal with ever-changing technology and the global nature of some cyberattacks. As technology evolves and becomes increasingly important in all aspects of life, cyberattacks will continue to bedevil authorities and individuals.
Computer Security
Computer security is a primary defense against cyberattacks that seeks to protect hardware and information. Computer security can encompass a variety of approaches, including security-focused operating systems, security architecture, secure coding, and security by design. Security-focused operating systems are those that strive to protect data from corruption, natural disaster, or theft. Although any operating system can be breached, those that are security-focused tend to address generic security flaws in a consistent and systematic manner.
Security architecture refers to a system's capacity to protect both the confidentiality and integrity of data. This is achieved through the interrelationship of structuring components, so they can be produced to quality standards and maintained over the system's useful life. Secure-coding software has been analyzed to minimize the bugs, defects, and flaws that are the chief causes of commonly exploited software vulnerabilities. Organizations that use secure coding often take proactive steps to eliminate as many of these vulnerabilities as possible before the software is deployed. The term security by design references software that has been securely designed from the start. Cyberattacks are anticipated, and care is taken to minimize potential risks and vulnerabilities in the coding process. Although an emphasis on security cannot completely prevent cyberattacks, it can minimize their occurrence and limit their severity. Engaging in the best security practices is costly, but the expense pales in comparison to the financial damage caused by security breaches.
Common Cyberattacks
Threats to the security of a computer system are exploited during cyberattacks. These attacks can take place when a system exhibits a vulnerability, which represents the intersection of three elements: a system flaw or susceptibility, an attacker's access to the flaw, and the attacker's capacity to exploit the flaw. Vulnerabilities result from a variety of causes, including software bugs, a computer virus, weak passwords, a script code injection (caused by processing invalid data), or a structured query language (SQL) misconfiguration. Vulnerabilities can lead to threats, the more common of which include exploits, eavesdropping, social engineering and human error, denial of service, indirect attacks, backdoors, and direct-access attacks.
Exploits are bits of software or a sequence of commands that use a software bug to cause unanticipated behavior of computer software or hardware. Exploit code is frequently reused in Trojan horses—malware that appears to perform a beneficial service for the user, but actually allows unauthorized access to a system—or computer viruses. Eavesdropping refers to monitoring electronic communications from a computer, such as e-mail or observing Webpages visited by a user. Eavesdropping can be authorized by a system's owner, but also can occur surreptitiously during cyberattacks. Social engineering and human error occur when cyberattackers send messages to computer users, in which the cyberattacker purports to be the system administrator or some other trusted source and requests and receives the user's password. Since computer systems depend on humans to maintain their security, such deception or carelessness is damaging.
...
- Africa, North
- Africa, Sub-Saharan
- Asia, East
- Asia, West, Central, and South
- Australia and Pacific Region
- Canada
- Caribbean Island Region
- China
- Desertification
- Earthquake Zones
- Europe, Eastern
- Europe, Western
- Evacuation Routes
- Glacial Melt
- Hurricane Zones
- Japan
- Mediterranean Region
- Mexico
- Middle East
- Ring of Fire
- Russia
- South America
- United Kingdom
- United States, California and West Coast
- United States, Great Lakes
- United States, Hawaii and Pacific Territories
- United States, Mid-Atlantic
- United States, Midwest
- United States, Mountain States
- United States, National
- United States, Northeast
- United States, Northwest and Northern Plains
- United States, Southeast and Gulf Coast
- United States, Southwest
- American Red Cross
- Center for International Disaster Information (CIDI)
- Centers for Disease Control and Prevention (CDC)
- ChildFund International
- Coast Guard, U.S.
- Cooperative for Assistance and Relief Everywhere (CARE)
- Defense, U.S. Department of Direct Relief
- Disaster Preparedness and Emergency Response Associations
- Doctors Without Borders
- Federal Emergency Management Agency (FEMA)
- Food and Agriculture Organization of the United Nations (FAO)
- Habitat for Humanity
- Homeland Security, U.S. Department of Institutional Coordination
- InterAction
- International Law in the Prevention and Mitigation of Disasters
- International Medical Corps
- International Red Cross
- Interpol
- Lutheran World Federation
- Mercy Corps
- National Governments
- Peace Corps
- Red Crescent Society
- Relief International
- Relief Rules
- Salvation Army
- St. Vincent de Paul
- State Governments
- United Nations
- United Nations Children's Fund (UNICEF)
- United Nations Development Programme (UNDP)
- United Nations High Commissioner for Refugees (UNHCR)
- United States Agency for International Development (USAID)
- World Concern
- World Emergency Relief
- World Food Program
- World Health Organization (WHO)
- World Relief
- World Vision
- History of Disaster Relief, Africa
- History of Disaster Relief, Ancient World
- History of Disaster Relief, China and East Asia
- History of Disaster Relief, Europe
- History of Disaster Relief, India
- History of Disaster Relief, Middle East
- History of Disaster Relief, North America
- History of Disaster Relief, Pacific Region
- History of Disaster Relief, Russia
- History of Disaster Relief, South America
- Chemical Disasters
- Cyberattacks
- Economic Disasters
- Food Contamination Disasters
- Gulf Coast Oil Spill (2010)
- Pandemic/Biological Accidents
- Poverty and Disasters
- Radiation Disasters
- Terrorism
- Wars
- Air Transport
- Food Distribution Infrastructure
- Internet
- Mass Transit
- Ports
- Railroads
- Roads
- Schools
- Utilities
- Water Systems
- Community Preparedness
- Community Response
- Evacuation
- Fire Departments
- Home Preparedness
- Local Hazards
- Municipal Offices of Emergency Management
- Personal Preparedness
- Police Departments
- Private Sector Preparedness
- Public Agency Preparedness
- Public-Private Partnerships
- University Preparedness
- Warnings
- Bubonic Plague
- HIV/AIDS
- Malaria (20th Century-Present)
- Measles (1850-Present)
- Severe Acute Respiratory Syndrome (SARS)
- Smallpox (20th Century)
- Tuberculosis (20th Century-Present)
- Earthquakes
- Famine
- Fire
- Floods
- Hurricanes
- Terrorist Attacks
- Tsunami
- Volcanoes
- Wars
- First Aid
- Hysteria
- Pandemic Planning
- Panic
- Panic
- Psychology, Mass
- Psychology, Personal
- Social Work
- Stress Syndromes
- Survivor Guilt
- Working With the Bereaved
- Agricultural Production
- Business Continuity Planning
- Citizen Preparedness Programs
- Cooperation Between Civilian and Military Agencies
- Crisis Management
- Education
- Emergency Response Guidelines and Regulations
- Emergency Rooms
- Evacuation Planning
- Evacuation, Types of
- Exercise Planning
- Food Distribution Systems
- Healthcare
- Hospital Preparedness
- International Standards
- Language Issues and Barriers
- Levels of Nutrition
- Mass Casualty Management
- Media
- National Incident Management System (NIMS)
- National Standards
- Packaging and Tracing of Food
- Paramedics
- Political Economy of Food
- Provision of Food in Disasters
- Refugee Policy
- Refugees, Care of
- Reserve Storage and Transport
- Transportation
- Vulnerable Populations
- Incentives, Intergovernmental and Intersystem
- Mitigation, Benefits and Costs of
- Private Sector, Role in Mitigation
- Public Sector, Role in Mitigation
- Public-Private Interactions in Mitigation
- Regulatory Approaches to Mitigation
- Risk, Government Assumption of
- Risk, Individual Assumption of
- Structural (Engineering) Options for Mitigation
- Avalanches
- Diseases
- Droughts
- Earthquakes
- Fires, Forest
- Fires, Urban
- Floods
- Heat Waves
- Hurricanes/Typhoons
- Landslides
- Pest Invasions
- Sea Surges
- Tornadoes
- Tsunamis
- Volcanoes
- Winter Storms
- Bilateral Versus Multilateral Aid
- Domestic Corruption in International Disasters
- Domestic Politics in International Disasters
- Donations, National
- Donations, Personal
- Funding of International Relief
- Fundraising Cycles
- Politics in International Funding
- Rejection of International Aid
- Intergovernmental Relations and Preparedness
- Planning for Disasters, International
- Planning for Disasters, Local
- Planning for Disasters, National
- Political Support for Preparedness
- Preparedness, Function of
- Preparedness Policy Implementation
- Private Sector, Role in Preparedness
- Research-Based Disaster Planning
- Private Sector, Role in Recovery
- Recovery, International
- Recovery, Local
- Recovery, National
- Recovery, Phases of
- Recovery, Role of Governments in
- Private Sector, Role in Response
- Response, Management Strategies
- Response, Operational Strategies
- Response, Stress Impacts of
- Data Processing
- Early Warning and Prediction Systems
- Funding, U.S.
- Global Warming
- Modeling
- National Oceanic and Atmospheric Administration (NOAA)
- Real-Time Communications
- Research
- Technology
- Technology, Military
- Causes of Complex Emergencies
- Cross-Cultural Interactions
- Cycles of a Disaster
- Disaster Experience
- Education
- Emergency Management Resources
- Ethics of Charity Relief
- Ethnicity and Minority Status Effects on Preparedness
- Gender and Disasters
- Human Rights
- Humanitarian Intervention Versus Humanitarian Action
- Income Inequality and Disaster Relief
- Laws
- Personal Preparedness
- Politics, Domestic
- Politics in International Funding
- Protection of Civilians in Conflict Zones
- Public Policy
- Refugees
- Relief Versus Development
- Risk Communications
- Risk Management
- Risk Perceptions
- Social Impact of Disasters
- Training for Disasters
- Victimology
- United States, California and West Coast
- United States, Great Lakes
- United States, Hawaii and Pacific Territories
- United States, Mid-Atlantic
- United States, Midwest
- United States, Mountain States
- United States, National
- United States, Northeast
- United States, Northwest and Northern Plains
- United States, Southeast and Gulf Coast
- United States, Southwest
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches