5 Cybersecurity Attack Case Studies

Lessons Learned

D. V. Manjula, Aisshwarya Nallamilli, and Dulkarnine Raseeda

DOI: 10.1201/9781003319887-5

CONTENTS

  1. Introduction
  2. Country-Wise Cyberattacks
  3. Distribution of Targets
  4. Cost of Cybercrime
  5. Conclusion

INTRODUCTION

An effort to manipulate computers, steal data, or use a computer system that has been infiltrated to launch more attacks is known as a cyberattack. Cybercriminals launch cyberattacks using phishing, man-in-the-middle attacks, ransomware, malware, and other methods (Rosch 2022). We classified the different types of attacks according to their features and elements that contributed to them, as shown through the analysis of related case studies. All organizations, including people, small ...

Get Cybersecurity for Decision Makers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.