Analysis of case studies on cyber attacks and proposed methods for their prevention

被引:4
|
作者
Leu, Daniel Mihai [1 ]
Udroiu, Catalin [1 ,2 ]
Raicu, Gabriel Margarit [1 ]
Garban, Horatius Nicolae [1 ,3 ]
Scheau, Mircea Constantin [1 ,4 ]
机构
[1] Constanta Maritime Univ, Constanta, Romania
[2] ZF Grp, Friedrichshafen, Germany
[3] Romanian Cyber Def Command, Minist Natl Def, Bucharest, Romania
[4] Univ Craiova, Craiova, Romania
关键词
cyber warfare; exfiltration; state sponsors; strategy; damages;
D O I
10.33436/v33i2y202309
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating in the private sector, or of a public sector organization, has become a priority target for malicious actors. From actors that operate under the alleged guise of financially motivated reasons such as ransomware operators to nation state threat groups and politically motivated actors that engage in hacktivist campaigns, an important certainty is that confidential data has become a top priority target for the various types of malicious actors operating across the cyber threat spectrum. Whether it is being sold to the highest bidder, released for free or used in the context of nation state affairs, confidential data became a high-value resource which, in combination with the increasingly complex and politically charged international context of the last few years, has brought about an uptick in number of cyber operations that could be classified as espionage. The aim of this paper is to present a study showcasing the various ways in which data theft, as the main objective, can materialize through malicious cyber campaigns ranging from ransomware operations executed by documented and well-known actors, to malware operations executed under the radar by obscure malicious actors.
引用
收藏
页码:119 / 134
页数:16
相关论文
共 50 条
  • [31] Probabilistic modeling and analysis of sequential cyber-attacks
    Liu, Qisi
    Xing, Liudong
    Zhou, Chencheng
    ENGINEERING REPORTS, 2019, 1 (04)
  • [32] System Information Comparison and Analysis Technology for Cyber Attacks
    Youn, Hyeonsu
    Kim, Duhoe
    Kim, Yong-Hyun
    Shin, Dongkyoo
    Shin, Dongil
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 446 - 451
  • [33] Analysis of Cyber Attacks Against Micro-PMUs: The Case of Event Source Location Identification
    Kamal, Mohasinina
    Farajollahi, Mohammad
    Mohsenian-Rad, Hamed
    2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2020,
  • [34] Analysis of Cyber-Attacks on IEC 61850 Networks
    Elgargouri, Ahmed
    Elmusrati, Mohammed
    2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 252 - 255
  • [35] POLYPHARMACY IN PSYCHIATRY - 3 CASE-STUDIES AND METHODS FOR PREVENTION
    STEWART, RB
    YEDINAK, KC
    WARE, MR
    ANNALS OF PHARMACOTHERAPY, 1992, 26 (04) : 529 - 533
  • [36] Analysis of jamming and spoofing cyber-attacks on drones
    Pey, Jeferson Nascimento Aquilar
    Nze, Georges Daniel Amvame
    Albuquerque, Robson de Oliveira
    Iberian Conference on Information Systems and Technologies, CISTI, 2022, 2022-June
  • [37] Evaluating damage from cyber attacks: A model and analysis
    Lala, C
    Panda, B
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 300 - 310
  • [38] On the control of microgrids against cyber-attacks: A review of methods and applications
    Solat, Amirhossein
    Gharehpetian, G. B.
    Naderi, Mehdi Salay
    Anvari-Moghaddam, Amjad
    APPLIED ENERGY, 2024, 353
  • [39] Analysis of cyber-attacks on smart grid applications
    Gunduz, M. Zekeriya
    Das, Resul
    2018 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP), 2018,
  • [40] Threat Analysis of Cyber Attacks with Attack Tree+
    Wang, Ping (pingwang@mail.ksu.edu.tw), 1600, Ubiquitous International (05):