Issue No.03 - May/June (2009 vol.11)
Simon Liu , US National Library of Medicine, National Institutes of Health
Bruce Cheng , Computer Sciences Corporation
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2009.46
Enterprises rely extensively on computerized information systems and electronic data in cyberspace to perform their daily activities and business. Today, virtually all public and private organizations connect to and live in cyberspace. As computers, information systems, and networking have become more ubiquitous, cybersecurity has become more critical for the continuity of business operations. To better understand cybersecurity, this article discusses the four "W's" of cyberattacks. It starts with an overview of the cause of cybersecurity problems, analyzes the challenges associated with it, outlines the cyberattacker profile, discusses cyberattack patterns, and finally summarizes recent cyberattack trends.
Cyberattacks, vulnerability, cyberattackers, attack patterns, IT professional
Simon Liu, Bruce Cheng, "Cyberattacks: Why, What, Who, and How", IT Professional, vol.11, no. 3, pp. 14-21, May/June 2009, doi:10.1109/MITP.2009.46