Cyberattacks: Why, What, Who, and How

  title={Cyberattacks: Why, What, Who, and How},
  author={Simon Liu and Bruce Cheng},
  journal={IT Professional},
As computers, information systems, and networking have become increasingly ubiquitous, cybersecurity has become even more critical for the continuity of basic business operations. This article analyzes the challenges associated with cybersecurity, including attack patterns and trends. 
Highly Cited
This paper has 24 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.
Showing 1-10 of 14 extracted citations

So long, and thanks for only using readily available scripts

Inf. & Comput. Security • 2017
View 4 Excerpts
Highly Influenced

Vulnerability of IT Infrastructures : Internal and External Threats

Sylvester Ngoma
View 6 Excerpts
Highly Influenced

Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks

2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec) • 2015
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 12 references

Svangård, “Wired Equivalent Privacy: A Memorandum in Secure Computer Systems,

H. Ju, K. Honkaniemi
Uppsala Univ., • 2009

Highlights from Black Hat 2008: Virtualization and Web Applications Remain High-Profile Security Issues,

J. Wheatman, P. E. Proctor
Contact him at chengbr@ Join the IEEE Computer Society • 2008

Eight Faces of a Hacker,

T. Wilson
Information Week, • 2007

Social Engineering: A Means to Violate a Computer System

M. Allen
SANS Inst., • 2007

Glossary of Key Information Security Terms, NIST IR 7298

R. Kissel
US Nat’l Inst. Standards and Tech., • 2006

Hacking: The Basics

M. Poulin
SANS Inst., • 2006

Windows Security Patch Management Case Study: Using Software Update Services to Deploy Critical Windows Updates,

M. Shepherd
SANS Inst., • 2005

Preliminary Findings: Understanding Criminal Computer Behavior: A Personality Trait and Moral Choice Analysis

M. Rogers
Purdue Univ., • 2003

Information Security Primer

C. E. Lindner
SANS Inst., • 2001

Similar Papers

Loading similar papers…