Explore chapters and articles related to this topic
Cyber threats and actors confronting the Construction 4.0
Published in Anil Sawhney, Mike Riley, Javier Irizarry, Construction 4.0, 2020
Erika A. Pärn, Borja Garcia de Soto
Cyber-criminals have made it their business to be able to harness the basic and real value of digital assets (BSI, 2015) and they can decipher the digital economy and its intricacies more astutely than those in the areas that are under attack (Kello, 2013). The most recent ‘WannaCry’ ransomware attack in May 2017 was a worldwide cyber-attack by the WannaCry ransomware cryptoworm that targeted computers that were running Microsoft Windows operating systems. The attacked data was encrypted, and ransom payments were demanded in the Bitcoin cryptocurrency. This showed the sophisticated measures that can be deployed by cyber-criminals in identifying, extracting and monetizing data found. While the value of digital assets to their owners and creators can vary, cyber-criminals manipulate data and information to encrypt, ransom or sell it piecemeal (Nicholson et al., 2012; Marinos, 2016).
The impact of time pressure on cybersecurity behaviour: a systematic literature review
Published in Behaviour & Information Technology, 2019
Noman H. Chowdhury, Marc T. P. Adam, Geoffrey Skinner
The real battle in cybersecurity is not just about the design and provisioning of sophisticated information technology (IT) artefacts, but also about human cybersecurity (HCS) behaviour (Jalali, Siegel, and Madnick 2018; Young et al. 2017). In 2008, it was an oversight in the security behaviour of a US soldier (deployed at a military base in Middle-East) that triggered the ‘most significant breach of US military computers’ in history (Knowlton 2010). Practitioners blame users’ negligence in updating windows patches and opening suspicious emails for the infamous WannaCry ransomware attack that affected more than 200,000 computers in 150 countries in 2017 (Washington Post 2017). In the same year, political data of roughly 61% of the US population was exposed after a marketing firm, contracted by the Republican National Committee, stored data in a misconfigured public server (Forbes 2017). It is estimated that more than 95 percent of successful cyber-attacks are caused by human error (IBM 2014).