To read this content please select one of the options below:

Cyberattack and Cyberwarfare Strategies for Businesses

aAtilim University, Turkey

Conflict Management in Digital Business

ISBN: 978-1-80262-774-9, eISBN: 978-1-80262-773-2

Publication date: 15 September 2022

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Keywords

Citation

Asbaş, C. and Tuzlukaya, Ş. (2022), "Cyberattack and Cyberwarfare Strategies for Businesses", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Leeds, pp. 303-328. https://doi.org/10.1108/978-1-80262-773-220221027

Publisher

:

Emerald Publishing Limited

Copyright © 2022 by Emerald Publishing Limited