Building a robust cyberthreat profile for institutions of higher educationd: an empirical analysis of external cyberattacks against a large University's computer network
This study investigated twelve categories of exploits targeting a large southern university to build a build a more robust cyberthreat profile for institutions of higher education. In one week, the university experienced 12.4 million external cyberattacks from 110 countries. Malware constituted 58%...
| VerfasserInnen: | ; ; |
|---|---|
| Medienart: | Elektronisch Aufsatz |
| Sprache: | Englisch |
| Veröffentlicht: |
2021
|
| In: |
International journal of law, crime and justice
Jahr: 2021, Band: 66 |
| Online-Zugang: |
Volltext (lizenzpflichtig) |
| Journals Online & Print: | |
| Verfügbarkeit prüfen: | HBZ Gateway |
| Schlagwörter: |
MARC
| LEADER | 00000caa a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 1776482913 | ||
| 003 | DE-627 | ||
| 005 | 20231109093105.0 | ||
| 007 | cr uuu---uuuuu | ||
| 008 | 211109s2021 xx |||||o 00| ||eng c | ||
| 024 | 7 | |a 10.1016/j.ijlcj.2021.100484 |2 doi | |
| 035 | |a (DE-627)1776482913 | ||
| 035 | |a (DE-599)KXP1776482913 | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rda | ||
| 041 | |a eng | ||
| 100 | 1 | |a Dollivera, Diana S. |e VerfasserIn |4 aut | |
| 245 | 1 | 0 | |a Building a robust cyberthreat profile for institutions of higher educationd |b an empirical analysis of external cyberattacks against a large University's computer network |c Diana S.Dollivera, Adam K.Ghazi-Tehrania, Kevin T.Poorman |
| 264 | 1 | |c 2021 | |
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a Computermedien |b c |2 rdamedia | ||
| 338 | |a Online-Ressource |b cr |2 rdacarrier | ||
| 520 | |a This study investigated twelve categories of exploits targeting a large southern university to build a build a more robust cyberthreat profile for institutions of higher education. In one week, the university experienced 12.4 million external cyberattacks from 110 countries. Malware constituted 58% of all malicious activities. Attacks were statistically more likely to occur during the overnight hours of weekdays. Moreover, the majority of cyberattack activity was generated by a limited number of IP addresses originating from a handful of countries. Dutch-originating IP addresses were responsible for 71% of all cyberattacks in this study, and spyware attacks almost exclusively originated from a single IP address in the U.S. | ||
| 650 | 4 | |a Cyberattacks | |
| 650 | 4 | |a Cybersecurity | |
| 650 | 4 | |a Universities | |
| 650 | 4 | |a Malware | |
| 650 | 4 | |a Routine Activity Theory | |
| 700 | 1 | |a Ghazi-Tehrania, Adam K. |e VerfasserIn |4 aut | |
| 700 | 1 | |a Poorman, Kevin, T. |e VerfasserIn |4 aut | |
| 773 | 0 | 8 | |i Enthalten in |t International journal of law, crime and justice |d Oxford : Elsevier, 2008 |g 66(2021), Artikel-ID 100484 |h Online-Ressource |w (DE-627)559427743 |w (DE-600)2412511-8 |w (DE-576)278242537 |x 1756-0616 |7 nnas |
| 773 | 1 | 8 | |g volume:66 |g year:2021 |g elocationid:100484 |
| 856 | 4 | 0 | |u http://doi.org/10.1016/j.ijlcj.2021.100484 |x Verlag |z lizenzpflichtig |3 Volltext |
| 951 | |a AR | ||
| ELC | |a 1 | ||
| LOK | |0 000 xxxxxcx a22 zn 4500 | ||
| LOK | |0 001 4000150839 | ||
| LOK | |0 003 DE-627 | ||
| LOK | |0 004 1776482913 | ||
| LOK | |0 005 20211109143408 | ||
| LOK | |0 008 211109||||||||||||||||ger||||||| | ||
| LOK | |0 040 |a DE-21-110 |c DE-627 |d DE-21-110 | ||
| LOK | |0 092 |o n | ||
| LOK | |0 852 |a DE-21-110 | ||
| LOK | |0 852 1 |9 00 | ||
| LOK | |0 935 |a krub | ||
| ORI | |a SA-MARC-krimdoka001.raw | ||
