Premium
Hackers, Snoopers, and Thieves: How to Handle the Latest Threats
Author(s) -
Cytryn Allan,
Beck Eric,
Ross Steven
Publication year - 2014
Publication title -
journal of corporate accounting and finance
Language(s) - English
Resource type - Journals
eISSN - 1097-0053
pISSN - 1044-8136
DOI - 10.1002/jcaf.21972
Subject(s) - hacker , confidentiality , variety (cybernetics) , computer security , internet privacy , business , computer science , artificial intelligence
Governments have been snooping on information systems in foreign countries and in their own. However, that's only part of a greater problem. The threat of cyberattacks from a variety of sources violates confidentiality and can cause the theft, abuse, manipulation, or destruction of information. But instead of narrowly focusing on a specific type of threat, the authors advise a well‐considered program: understand the actual risks, develop an overall information security strategy, and implement advanced and persistent defenses against cyberattacks.