IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Attacks Through the Ages: Impact Assessment and Defense Strategies

Cyber Attacks Through the Ages: Impact Assessment and Defense Strategies
View Sample PDF
Author(s): R. Raman (Chitkara University, India), Hakam Singh (Chitkara University, India), Nilamadhab Mishra (VIT Bhopal University, India), Abhishek Thakur (Chitkara University, India), Ramamani Tripathy (Chitkara University, India), Rudra Kalyan Nayak (VIT Bhopal University, India)and Amit Thakur (VIT Bhopal University, India)
Copyright: 2025
Pages: 28
Source title: Cryptography, Biometrics, and Anonymity in Cybersecurity Management
Source Author(s)/Editor(s): Mohammed Amin Almaiah (Department of Computer Science, The University of Jordan, Jordan)and Said Salloum (School of Science, Engineering, and Environment, University of Salford, UK)
DOI: 10.4018/979-8-3693-8014-7.ch016

Purchase

View Cyber Attacks Through the Ages: Impact Assessment and Defense Strategies on the publisher's website for pricing and purchasing information.

Abstract

Digitization in the modern world is increasing, and along with it, Cyber-attacks have become a very big concern for individuals, nations, and organizations. In this research paper, we will dive into multiple factors of cyber-attacks and explore their types, perpetrators, impacts, and motivations in depth. We will dissect the different methodologies employed by cyber adversaries and their vulnerabilities through different case studies of significant incidents that exploit their role in politics, pursuit of financial gain, and ideological agendas. The speedy digitization of contemporary society has brought about the emergence of cyber-assaults as an excessive global chance, with people, agencies, and global locations increasingly at risk of the damaging outcomes of such malicious sports. The cyber chance landscape has advanced appreciably over the past few years, with cyber adversaries using state-of-the-art strategies to compromise virtual structures and attain their nefarious goals.

Related Content

Qais Al-Na'amneh, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Mahmoud Aljawarneh, Braa Qadoumi, Shahid Munir Shah. © 2025. 28 pages.
K. G. Anilkumar, D. Muhammad Noorul Mubarak. © 2025. 12 pages.
Tuqa Al-Makkawi, Ayoub Alsarhan, Qais Al-Na'amneh, Mohammad Aljaidi, Mohammed Amin Almaiah, Mahmoud AlJamal, Rabee Alqura'n, Mahmoud Aljawarneh. © 2025. 20 pages.
Qais Al-Na'amneh, Walid Dhifallah, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Braa Qadoumi, Ayoub Alsarhan. © 2025. 16 pages.
Brijesh Yadav, Vishal Jain. © 2025. 36 pages.
Malak Al-Majali, Mohammad Aljaidi, Qais Al-Naamneh, Ghassan Samara, Ayoub Alsarhan, Braa Qadoumi. © 2025. 14 pages.
S. Indra Priyadharshini, T. V. Padmavathy, D. Shiny Irene. © 2025. 18 pages.
Body Bottom