As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
The technology associated with the Internet is said to evolve at the speed of light. That is certainly true when it comes to understanding the strategies and tactics used to commit cybercrimes, whether those crimes target military, governmental or private-sector organizations, and whether the threat actors are governments, government sponsored hackers, criminal cyber-gangs or individuals. In this paper, we examine recent evolutions of cyberspace threats to move them from simple and direct to more layered complex and stealthy methodologies. For example, what appears to be a ransomware attack encrypting files with the hope of collecting a ransom payment for a decryption key may actually hide the actual theft of that data, representing an actual data compromise. Suggestions for maintaining and improving an organization’s readiness to deal with these hybrid threats are provided.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.