Cybersecurity Threats: Malware in the Code
Pratim Milton Datta ()
Additional contact information
Pratim Milton Datta: Kent State University
Chapter Chapter 10 in Global Technology Management 4.0, 2022, pp 155-170 from Springer
Abstract:
Abstract Hackers are ingeniously nefarious and scheming. TargetTarget was hacked in December 2013. The hackers actually didn’t try to directly access the main customer database that was securely hidden and protected by IDS. Instead, the hackers accessed Target’s information portal through the digital HVAC (heating, ventilation, and AC) system that was managed by some third-party contractor with much less protection. The HVAC system could be remotely controlled and was linked to the main Target customer information database.
Date: 2022
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-030-96929-5_10
Ordering information: This item can be ordered from
http://www.springer.com/9783030969295
DOI: 10.1007/978-3-030-96929-5_10
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().