Page 53 - Auditinf Electronic System
P. 53

✓ distributed denial-of-service (DDoS): attack comes from multiple sources,
     for example, the machines of several innocent parties infected by Trojan horses.
     When activated, these programs send messages to the target and leave the
     connection open.

✓ DoS attack may establish as many network connections as possible to exclude
     other users, thus overloading primary memory or corrupting file systems.

❖ A Man-in-the-middle (MITM): attack is a type of cyber-attack in which the
     attacker secretly intercepts and relays messages between two parties who
     believe they are communicating directly with each other. The attack is a type
     of eavesdropping in which the attacker intercepts and then controls the entire
     conversation.

 Cybersecurity attacks Effects:
 ❖ Remedial costs associated with a loss of data and information and the loss of

      business after an attack (as ransoms paid to retrieve data)
  ❖ Loss of revenues due to a loss of data or customers
  ❖ Regulatory fines
  ❖ Litigation costs
  ❖ Reputational damage that can lead to loss of customers and reduced investor

      confidence.
  ❖ claims resulting from breach of data privacy.
  ❖ loss or diminished value of intellectual property.

  Sixth: What are the sources of Cyber risks:

 Five common sources of cyber threats:
         ▪ include nation-states,
         ▪ cybercriminals,
         ▪ hacktivists,
         ▪ insiders and service providers.
         ▪ developers of substandard products and services.

 Seventh: Cyber security and Cybersecurity management:

         Cybersecurity risk management refers to the processes and controls
 implemented by a firm to manage cybersecurity risks. one that enables the firm
 to detect security events on a timely basis and to respond to and recover from
 such events with minimal disruption to the firm's operations and enhance
 transparency in this regard.

                                                           54

                                                                             53

‫جميع الحقوق محفوظة ـ الإعتداء على حق المؤلف بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونية‬
   48   49   50   51   52   53   54   55   56   57   58