Related Articles
DDoS Attacks
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic to a web property. In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource ...
Cyber-Insurance
A specialty insurance product intended to protect businesses from Internet-based risks, and more generally from risks relating to information technology infrastructure, information privacy, information governance liability, and related activities.
Man-in-the-Middle Attacks
A man-in-the-middle attack requires three players. There’s the victim, the entity with which the victim is trying to communicate, and the “man in the middle,” who’s intercepting the victim’s communications. Critical to the scenario is that the victim ...
Vishing
Voice phishing, or vishing, is the use of telephony to conduct phishing attacks. Landline telephone services have traditionally been trustworthy; terminated in physical locations known to the telephone company, and associated with a bill-payer.
Security Assessment
A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack(such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect ...