Please enable JavaScript.
Coggle requires JavaScript to display documents.
Report on Cyberattacks (2014 to 2018) (Top Five Victims of Cyberattacks in…
Report on Cyberattacks (2014 to 2018)
Introduction
Cybersecurity Question
Motivations for Cyberattacks
Types of Cyber Attackers
Modus Operandi of Cyber Attackers
Major Cyberattacks in the last Five Years – (2014 to 2018)
Top Five Victims of Cyberattacks in period under review (2014 to 2018)
eBay’s Data Breach of 2014
The perpetrators
What Happened
How It Happened
Type of loss suffered
Why did it Happened
Possible Corrective/Preventive Measures
Anthem’s Data Breach of 2015
The perpetrators
What Happened
How It Happened
Type of loss suffered
Why did it Happened
Possible Corrective/Preventive Measures
Adult Friend Finder’s Data Breach of 2016
The perpetrators
What Happened
How It Happened
Type of loss suffered
Why did it Happened
Possible Corrective/Preventive Measures
Equifax’s Data Breach of 2017
The perpetrators
What Happened
How It Happened
Type of loss suffered
Why did it Happened
Possible Corrective/Preventive Measures
Marriott’s Data Breach of 2018
What Happened
The perpetrators
What Happened
How It Happened
Type of loss suffered
Why did it Happened
Possible Corrective/Preventive Measures
Recommendation
Conclusions
Types of Cyberattacks