Analysis of case studies on cyber attacks and proposed methods for their prevention

被引:4
|
作者
Leu, Daniel Mihai [1 ]
Udroiu, Catalin [1 ,2 ]
Raicu, Gabriel Margarit [1 ]
Garban, Horatius Nicolae [1 ,3 ]
Scheau, Mircea Constantin [1 ,4 ]
机构
[1] Constanta Maritime Univ, Constanta, Romania
[2] ZF Grp, Friedrichshafen, Germany
[3] Romanian Cyber Def Command, Minist Natl Def, Bucharest, Romania
[4] Univ Craiova, Craiova, Romania
关键词
cyber warfare; exfiltration; state sponsors; strategy; damages;
D O I
10.33436/v33i2y202309
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating in the private sector, or of a public sector organization, has become a priority target for malicious actors. From actors that operate under the alleged guise of financially motivated reasons such as ransomware operators to nation state threat groups and politically motivated actors that engage in hacktivist campaigns, an important certainty is that confidential data has become a top priority target for the various types of malicious actors operating across the cyber threat spectrum. Whether it is being sold to the highest bidder, released for free or used in the context of nation state affairs, confidential data became a high-value resource which, in combination with the increasingly complex and politically charged international context of the last few years, has brought about an uptick in number of cyber operations that could be classified as espionage. The aim of this paper is to present a study showcasing the various ways in which data theft, as the main objective, can materialize through malicious cyber campaigns ranging from ransomware operations executed by documented and well-known actors, to malware operations executed under the radar by obscure malicious actors.
引用
下载
收藏
页码:119 / 134
页数:16
相关论文
共 50 条
  • [21] DETECTION AND PREVENTION OF CYBER DEFENSE ATTACKS USING MACHINE LEARNING ALGORITHMS
    Shang, Yongqiang
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 760 - 769
  • [22] A comparative study of the proposed national cyber-terror prevention act
    Department of Conversing Technology, Hoseo Graduate School of Venture, Korea, Republic of
    不详
    Int. J. Secur. Appl., 10 (267-274):
  • [23] A Comparative Study of the Proposed National Cyber-terror Prevention Act
    Park, Dea-woo
    Shin, Jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (10): : 267 - 273
  • [24] Frameworks Proposed to Address the Threat of Cyber-Physical Attacks to Lean 4.0 Systems
    Shahin, Mohammad
    Chen, F. Frank
    Bouzary, Hamed
    Zarreh, Alireza
    30TH INTERNATIONAL CONFERENCE ON FLEXIBLE AUTOMATION AND INTELLIGENT MANUFACTURING (FAIM2021), 2020, 51 : 1184 - 1191
  • [25] DDoS Attacks on the Internet of Things and their Prevention Methods
    Mustapha, Hanan
    Alghamdi, Ahmed M.
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [26] Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries
    Sarowa, Sandeep Kumar
    Bhanot, Bhisham
    Kumar, Vijay
    AIST 2022 - 4th International Conference on Artificial Intelligence and Speech Technology, 2022,
  • [27] Vulnerability analysis of cyber physical systems under the false alarm cyber attacks
    Tu, Haicheng
    Xia, Yongxiang
    Chen, Xi
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 599
  • [28] Reliability Analysis of Cyber-Physical Systems Considering Cyber-Attacks
    Fang, Z. H.
    Mo, H. D.
    Wang, Y.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 364 - 368
  • [29] The Perpetration and Prevention of Cyber Crime: An Analysis of Cyber Terrorism in India
    Kumar, Poonam
    Mittal, Saurabh
    INTERNATIONAL JOURNAL OF TECHNOETHICS, 2012, 3 (01) : 43 - 52
  • [30] Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
    Mazhar, Tehseen
    Irfan, Hafiz Muhammad
    Khan, Sunawar
    Haq, Inayatul
    Ullah, Inam
    Iqbal, Muhammad
    Hamam, Habib
    FUTURE INTERNET, 2023, 15 (02)