Cyberattacks in the context of Information security


Cyberattacks in the context of Information security

Cyberattacks Study page number 1 of 1

Play TriviaQuestions Online!

or

Skip to study material about Cyberattacks in the context of "Information security"


⭐ Core Definition: Cyberattacks

A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.

The rising dependence on increasingly complex and interconnected computer systems in most domains of life is the main factor that causes vulnerability to cyberattacks, since virtually all computer systems have bugs that can be exploited by attackers. Although it is impossible or impractical to create a perfectly secure system, there are many defense mechanisms that can make a system more difficult to attack, making information security a field of rapidly increasing importance in the world today.

↓ Menu
HINT:

In this Dossier

Cyberattacks in the context of Five Eyes

The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence. Informally, "Five Eyes" can refer to the group of intelligence agencies of these countries. The term "Five Eyes" originated as shorthand for a "AUS/CAN/NZ/UK/US Eyes Only" (AUSCANNZUKUS) releasability caveat.

The origins of the FVEY can be traced to informal, secret meetings during World War II between British and American code-breakers that took place before the US formally entered the war. The alliance was formalized in the post-war era by the UKUSA Agreement in 1946. As the Cold War deepened, the intelligence sharing arrangement was formalised under the ECHELON surveillance system in the 1960s. This system was developed by the FVEY to monitor the communications of the Soviet Union and Eastern Bloc; it is now used to monitor communications worldwide. The FVEY expanded its surveillance capabilities during the course of the "war on terror", with much emphasis placed on monitoring the Internet. The alliance has grown into a robust global surveillance mechanism, adapting to new domains such as international terrorism, cyberattacks, and contemporary regional conflicts.

View the full Wikipedia page for Five Eyes
↑ Return to Menu

Cyberattacks in the context of Anonymous (group)

Anonymous is an international collective, organized as a decentralized group of activist and hacktivist individuals, best known for orchestrating cyberattacks against governments, government institutions, agencies, corporations, and the Church of Scientology.

Anonymous originated in 2003 on the imageboard 4chan representing the concept of many online and offline community users simultaneously existing as an "anarchic", digitized "global brain" or "hivemind". Anonymous members (known as anons) can sometimes be distinguished in public by the wearing of Guy Fawkes masks in the style portrayed in the graphic novel and film V for Vendetta. Some anons also opt to mask their voices through voice changers or text-to-speech programs.

View the full Wikipedia page for Anonymous (group)
↑ Return to Menu

Cyberattacks in the context of Lazarus Group

The Lazarus Group (also known as the Guardians of Peace or Whois Team) is a state-sponsored hacker group made up of unknown members, alleged to be run by the government of North Korea. While not much is known about the group, researchers have attributed many cyberattacks to them since the 2010s.

Originally deemed as a clandestine criminal group, the group has now been designated as an advanced persistent threat due to its intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include Hidden Cobra (used by the United States Department of Homeland Security to refer to malicious cyber activity by the North Korean government in general), ZINC and Diamond Sleet (by Microsoft). According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as the 414 Liaison Office.

View the full Wikipedia page for Lazarus Group
↑ Return to Menu