TITLE

Hack Tivism

AUTHOR(S)
Davis, Adrian
PUB. DATE
June 2012
SOURCE
ITNOW;Summer2012, Vol. 54 Issue 2, p30
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Over the last two or so years, organisations have had to meet a new and highly specific online threat. That threat is hacktivism and Adrian Davis, Principal Research Analyst at the Information Security Forum, takes a look at the threat from an information security perspective, based on research conducted by the Information Security Forum and the experiences of its 300 global member organisations.
ACCESSION #
75698453

 

Related Articles

  • These goofs will make your mistakes seem minor. Altom, Tim // Indianapolis Business Journal;12/22/2008, Vol. 29 Issue 43, p24 

    The article focuses on data related to hacking listed by Dataloss DB. It is indicated that 8 million records lost to hackers from Best Western in August 2008, 47 million lost to hackers in January 2007 from TJX Cos. Inc. and 40 million to hackers in 2005. Many more losses were because of...

  • Twitter Trouble. Carr, John // Information Today;Feb2009, Vol. 26 Issue 2, p2 

    The article focuses on a security breach experienced by Twitter on January 5, 2009. A hacker accessed a Twitter employee's account, granting him or her access to administrative tools to reset the password on any other users' accounts. The hacker had access to the entire Twitter network. In the...

  • Global snapshots.  // SC Magazine: For IT Security Professionals (UK Edition);Jan/Feb2010, p9 

    This section offers news briefs on global developments in information security. The British National Health Service experienced a data breach, losing data from 1,000 occupational therapy patients and staff members. German Internet users are suffering an online crime wave according to research...

  • Cyber criminals steal $445 billion yearly.  // Flare (Pakistan);Jul2014, p57 

    The article discusses the Center for Strategic and International Studies' (CSIS) research which showed the impact of cyber crime to the global economy. Topics discussed include the cost of damage to business from theft of intellectual property, cyber crime as damaging to trade, competitiveness...

  • FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE. ARMENCHEVA, Ilina; SMOLENOV, Stefko // Revista Academiei Fortelor Terestre;2015, Vol. 20 Issue 3, p259 

    In nova days ICT progress and the daily life dependency on Internet leads to emergence of many new challenges and threats in cyber space. They can escalate from simple hacker's breach to more serious attacks that take effect over the great number of cyber terrorism victims and even to the cyber...

  • RESEARCHERS FIND DATABASE OF 8,700 STOLEN CREDENTIALS. Prince, Brian // eWeek;3/3/2008, Vol. 25 Issue 7, p13 

    The article outlines the discovery of 8,700 stolen FTP server credentials by researchers at FinJan Inc. in the U.S. According to researchers, these FTP server credentials include passwords, user names and server addresses that could allow a hacker to compromise servers and they discovered that...

  • Unmasking Anonymous. Walker, John // ITNOW;Summer2012, Vol. 54 Issue 2, p28 

    We have observed groups arrive on the hacking scene and one very notable representation is the now infamous Anonymous. John Walker FBCS CITP asks: who are they, what is there objective and what are the implications for the future?

  • A Right to Cybercounter Strikes: The Risks of Legalizing Hack Backs. Kallberg, Jan // IT Professional;Jan2015, Vol. 17 Issue 1, p30 

    The idea to legalize hacking back has gained traction in the last few years and has received several influential corporate and political proponents in the US and Europe. The growing frustration with repeated cyberattacks and a lack of effective law enforcement pushes for alternative ways to...

  • LOS NUEVOS MODI OPERANDI DE LOS CIBERDELINCUENTES DURANTE LA CRISIS ECONÓMICA. DE DIOS MESEGUER GONZÁLEZ, JUAN // Revista de Derecho UNED;2013, Issue 12, p495 

    With this article, we aim to raise awareness of the conflict and the challenges both police procedural, to address a varied and innovative type of crime that threatens constantly «from the dark side of the network» fundamental rights of our citizens, but especially so in the years we have...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics