EconPapers    
Economics at your fingertips  
 

Cyberattacks survival guide

Gadi Naveh

Cyber Security: A Peer-Reviewed Journal, 2018, vol. 1, issue 4, 368-376

Abstract: If your organisation experienced a cyberattack tomorrow, how would your defences cope? Would they keep your company‘s applications and data safe from harm, or would they fall victim to the attack? This paper highlights five of the most common threats that businesses experience, including polymorphic malware, man-in-the-middle attacks, cryptominers, DDoS bots and targeted intruders, and describes security techniques that can mitigate the impact of those threats. The paper goes on to describe five real cyberattacks that Check Point‘s Incident Response Team encountered on customers‘ networks and how each was remedied.

Keywords: cyberattacks; threat intelligence; threat prevention; ransomware; phishing (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/3992/download/ (application/pdf)
https://hstalks.com/article/3992/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2018:v:1:i:4:p:368-376

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2018:v:1:i:4:p:368-376