Access "The ideology of hacking"
This article is part of the 13 August 2013 issue of Is the UK smart meter project doomed to fail?
Modern day information risk has evolved from amateur script kiddies, locked in their bedrooms at home seeking to outsmart their friends, to a highly organised and professional criminal activity. While the nature of the attacker has changed dramatically, has the victim’s response been adequate? We have previously spoken at length about the technical solutions necessary for a business to tackle that ever-increasing and evolving threat, but lately I have been thinking, "is that enough, or are other parameters as important?". In my view, to truly understand the threat you have to understand why a company could become a target. Why does the hacktivist community, even though their numbers swell and they become ever more organised in their operations, remain focused on targeting specific companies? Indeed, historic analysis suggests that there may be a number of indicators that point to why hacktivists undertake attacks on those specific companies and that, in many cases, it could be argued that the company itself is to blame. The indicator I want to discuss here ... Access >>>
Premium Content for Free.
Business skills key to CISO’s survival
by Warwick Ashford
Business skills are key components of any CISO says Paul Swarbrick, CISO at aeronautical information service, NATS
- Business skills key to CISO’s survival by Warwick Ashford
The ideology of hacking
by Mark Brown
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information
- The ideology of hacking by Mark Brown
More Premium Content Accessible For Free
In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...
Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...