Page 53 - Auditinf Electronic System
P. 53
✓ distributed denial-of-service (DDoS): attack comes from multiple sources,
for example, the machines of several innocent parties infected by Trojan horses.
When activated, these programs send messages to the target and leave the
connection open.
✓ DoS attack may establish as many network connections as possible to exclude
other users, thus overloading primary memory or corrupting file systems.
❖ A Man-in-the-middle (MITM): attack is a type of cyber-attack in which the
attacker secretly intercepts and relays messages between two parties who
believe they are communicating directly with each other. The attack is a type
of eavesdropping in which the attacker intercepts and then controls the entire
conversation.
Cybersecurity attacks Effects:
❖ Remedial costs associated with a loss of data and information and the loss of
business after an attack (as ransoms paid to retrieve data)
❖ Loss of revenues due to a loss of data or customers
❖ Regulatory fines
❖ Litigation costs
❖ Reputational damage that can lead to loss of customers and reduced investor
confidence.
❖ claims resulting from breach of data privacy.
❖ loss or diminished value of intellectual property.
Sixth: What are the sources of Cyber risks:
Five common sources of cyber threats:
▪ include nation-states,
▪ cybercriminals,
▪ hacktivists,
▪ insiders and service providers.
▪ developers of substandard products and services.
Seventh: Cyber security and Cybersecurity management:
Cybersecurity risk management refers to the processes and controls
implemented by a firm to manage cybersecurity risks. one that enables the firm
to detect security events on a timely basis and to respond to and recover from
such events with minimal disruption to the firm's operations and enhance
transparency in this regard.
54
53
جميع الحقوق محفوظة ـ الإعتداء على حق المؤلف بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونية