Content area
Full Text
ABSTRACT
Cyber-attacks and / or on the web arose with the advent of the Internet. They use a variety of malware software. Phishing attacks and spam remain the cyber threats companies are facing most frequently. At the same time the volume of malware and spam attacks have increased substantially in the past years. The threat of cyber-crime is a daily reality for companies and making the challenges dynamic and continuous. This means that the CEOs (Chief Executive Officers) and top management must include FDA (Forensic Data Analytics) as a critical component in their risk management and compliance. The need for these investments is strengthened by the current regulatory environment and market reaction to situations of alleged fraud, bribery and cyber-attacks in the corporate environment. The fact that these attacks will not disappear is given by the reasons behind them, which is that are closely related to people's thirst for power, fame and wealth. The paper aims to present relevant issues, statistics and considerations on this phenomenon - crime / cybercrime and / or cyber. In the end of the paper we present a few issues of the last level that was reached - in cyber war.
KEYWORDS: cyber-attacks, cyber war, cyber mercenaries, ransomware, active and proactive actions
1.INTRODUCTION
Today more and more companies, businesses, government agencies and non-governmental organizations become victims of cyber attacks [1]. According to a survey, 91% of organizations surveyed have experienced a cyber attack at least once in the last 12 months, while 9% were victims of attacks target predefined - activity carefully planned in advance in order infect the network infrastructure of a specific organization. These are just estimated information companies. The widespread use of digital devices in business activity has created ideal conditions for the development and launch cyber espionage malware that can steal company data.
2.THE THREATS FOR COMPANIES
Potential Cyber Threats (informatics) is so large, that malware can replace almost completely in the near future sources inside the company and other classical techniques for gathering information [2]. The main findings of recent years are:
* were disclosed spyware attacks aimed at government organizations;
* most cyber incidents were aimed at stealing information;
* attacks identified to target contractors in order to reach large organizations;
*...