Common Cyberattacks

  • Donaldson S
  • Siegel S
  • Williams C
  • et al.
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

When people talk about cyberattacks, they generally think about the solitary hacker, penetrating computers in far-away countries and stealing data, changing records, or doing other dastardly deeds. In reality, there is a veritable smorgasbord of cyberattacks out there that use various techniques to get into the enterprise, maintain a presence, and move around within the enterprise to accomplish the attackers' objectives.

Cite

CITATION STYLE

APA

Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Common Cyberattacks. In Enterprise Cybersecurity (pp. 281–295). Apress. https://doi.org/10.1007/978-1-4302-6083-7_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free