paint-brush
Digital Threats and Countermeasures: How Close are We to a Cyberwar?by@valeryyy
370 reads
370 reads

Digital Threats and Countermeasures: How Close are We to a Cyberwar?

by Valery11mJanuary 29th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

At its core, today’s world relies on digital technologies. Public infrastructure, transport, communication, business, government, finance, and healthcare depend on the synergy and stable functioning of IT environments at all levels. A single disruption in a link of IT processes may cause the entire system to fail, resulting in service unavailability. The downtime of banks and public institutions, for instance, leads to significant inconveniences for citizens. A major system disruption as a result of a cyberattack on an IT environment of a particular organization means the probability of critical data loss or theft. In turn, loss or leakage of data causes public image deterioration, unwanted reputational and financial consequences, and even legal fines for organizations due to noncompliance. What is a cyber attack? Who is a cybercriminal and a cyberterrorist? Where does a cyberwar start? What is cyber security and how to design it? In this post, we will explain what are cyberattacks, the main types of cyber threats, examples of cyberwar, and IT cyber security approaches.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Digital Threats and Countermeasures: How Close are We to a Cyberwar?
Valery HackerNoon profile picture
Valery

Valery

@valeryyy

Tech writer

About @valeryyy
LEARN MORE ABOUT @VALERYYY'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Valery HackerNoon profile picture
Valery@valeryyy
Tech writer

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite