Page 53 - Demo
P. 53
جميع الحقوق محفوظة ـ اإلعتداء عىل حق املؤلف 53 بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونيةFourth: What are Cybersecurity Risks:Cybersecurity Risks Refers to the risk arising from dealing in the cyberspace (internet). Cybersecurity risk is an ever-increasing risk that requires increasing controls due to the increase and complete dependence on the internet in the business environment As companies turn to digital technologies for business operations, the risk of a security breach continues to rise. In fact, leaders in the profession have identified cybersecurity as the number one technology risk. Fifth: What are the resulting Cyber -attacks? and the effect on client firmCyberattacks are perpetrated for varied reasons, including but not limited to financial fraud, information theft or misuse, activist causes, to render computer systems inoperable, and to disrupt critical infrastructure and vital services of a government or organization. Cyber-attacks examples: Phishing: The attacker sends a large number of fraudulent emails and gains access to the system. Structured query language (SQL Injections): The attacker gains access to the protected information by adding malicious code to the SQL server. Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data. Passwords also may be compromised by IP spoofing, and packet sniffers. Spoofing: is identity misrepresentation in cyberspace, (e.g., Using a false website to obtain visitors personal and Confidential information). Sniffing: is the use of software to eavesdrop on information sent by a user to the host computer of a websites Denial of service Attack (DOS): an attack meant to shut down a machine or network, making it inaccessible to its intended users by overloading the system with information.

