Cyberattack
A cyberattack (or cyber attack) is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices,[1] or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent.[2] Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack (DDoS).
"Cyberstrike" redirects here. For the online game, see CyberStrike.
A cyberattack may steal, alter, or destroy a specified target by hacking into a private network or otherwise susceptible system.[3] Cyber Attacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations. Legal experts are seeking to limit the use of the term to incidents causing physical damage, distinguishing it from the more routine data breaches and broader hacking activities.[4]
Cyberattacks have become increasingly sophisticated, hazardous,[5] and expensive to recover from.[6]
User behavior analytics and Security Information and Event Management (SIEM) can be used to help prevent these attacks.
Prevalence[edit]
In the first six months of 2017, two billion data records were stolen or impacted by cyber attacks, and ransomware payments reached US$2 billion, double that in 2016.[14] In 2020, with the increase of remote work as an effect of the COVID-19 global pandemic, cybersecurity statistics reveal a huge increase in hacked and breached data.[15] The worldwide information security market is forecast to reach $170.4 billion in 2022.[16]
Consequences can include a multitude of direct and indirect effects. In September 2020, media reported of what may be the first publicly confirmed case of a civilian fatality as a nearly direct consequence of a cyberattack, after ransomware disrupted a hospital in Germany.[66]
A whole industry is working to minimize the likelihood and the consequences of a cyberattack.
For a partial list see: Computer security software companies.
Activities, often offered as products and services, may be aimed at:
Many organizations are trying to classify vulnerability and their consequences. The most popular vulnerability database is the Common Vulnerabilities and Exposures.
Computer emergency response teams are set up by governments and large organizations to handle computer security incidents.