cyber attack
küberrünne
olemus
küberruumi kaudu sooritatav ja küberruumi kasutamisele suunatud rünne, püüab
- häirida, pärssida, hävitada või kahjustavalt valitseda andmetöötluse keskkonda või taristut või
- rikkuda andmete terviklust või
- varastada tundlikku teavet
ülevaateid
https://www.slideshare.net/enigma2me/anatomy-of-a-cyber-attack-31725246
http://www.oracle.com/us/technologies/linux/anatomy-of-cyber-attacks-wp-4124673.pdf
https://www.sbir.gov/sites/all/themes/sbir/dawnbreaker/img/documents/Course10-Tutorial2.pdf
https://www.slideshare.net/krishhsivakrishna/types-of-cyber-attacks
https://www.slideshare.net/codefortomorrow/cyber-attack-37492669
https://www.slideshare.net/Cybereason/the-cyber-attack-lifecycle
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf
http://www.ijoil.com/wp-content/uploads/2015/04/CYBER-ATTACKS-ACCEPTED-JOURNAL-1.pdf
http://web.mit.edu/smadnick/www/wp/2018-08.pdf
http://www.jihmsp.org/~jihmsp/2014/vol5/JIH-MSP-2014-04-018.pdf
https://www.csacademy.nl/images/scripties/2018/Paul_Pols_-_The_Unified_Kill_Chain_1.pdf
näiteid
https://www.checkpoint.com/downloads/product-related/whitepapers/preventing-the-next-mega-cyber-attack.pdf
https://www.technologyreview.com/s/540786/the-20-most-infamous-cyberattacks-of-the-21st-century-part-i/
https://smidcloud.com/en/worst-cyber-data-breaches-in-21st-century-and-how-they-could-be-prevented-vol-ii/
vt ka
- purustav küberrünne