The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2009 vol. 11)
ISSN: 1520-9202
pp: 14-21
Simon Liu , US National Library of Medicine, National Institutes of Health
Bruce Cheng , Computer Sciences Corporation
Enterprises rely extensively on computerized information systems and electronic data in cyberspace to perform their daily activities and business. Today, virtually all public and private organizations connect to and live in cyberspace. As computers, information systems, and networking have become more ubiquitous, cybersecurity has become more critical for the continuity of business operations. To better understand cybersecurity, this article discusses the four "W's" of cyberattacks. It starts with an overview of the cause of cybersecurity problems, analyzes the challenges associated with it, outlines the cyberattacker profile, discusses cyberattack patterns, and finally summarizes recent cyberattack trends.
Cyberattacks, vulnerability, cyberattackers, attack patterns, IT professional

B. Cheng and S. Liu, "Cyberattacks: Why, What, Who, and How," in IT Professional, vol. 11, no. , pp. 14-21, 2009.
86 ms
(Ver 3.3 (11022016))