Building a robust cyberthreat profile for institutions of higher educationd: an empirical analysis of external cyberattacks against a large University's computer network

This study investigated twelve categories of exploits targeting a large southern university to build a build a more robust cyberthreat profile for institutions of higher education. In one week, the university experienced 12.4 million external cyberattacks from 110 countries. Malware constituted 58%...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
VerfasserInnen: Dollivera, Diana S. (VerfasserIn) ; Ghazi-Tehrania, Adam K. (VerfasserIn) ; Poorman, Kevin, T. (VerfasserIn)
Medienart: Elektronisch Aufsatz
Sprache:Englisch
Veröffentlicht: 2021
In: International journal of law, crime and justice
Jahr: 2021, Band: 66
Online-Zugang: Volltext (lizenzpflichtig)
Journals Online & Print:
Lade...
Verfügbarkeit prüfen: HBZ Gateway
Schlagwörter:

MARC

LEADER 00000caa a2200000 c 4500
001 1776482913
003 DE-627
005 20231109093105.0
007 cr uuu---uuuuu
008 211109s2021 xx |||||o 00| ||eng c
024 7 |a 10.1016/j.ijlcj.2021.100484  |2 doi 
035 |a (DE-627)1776482913 
035 |a (DE-599)KXP1776482913 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Dollivera, Diana S.  |e VerfasserIn  |4 aut 
245 1 0 |a Building a robust cyberthreat profile for institutions of higher educationd  |b an empirical analysis of external cyberattacks against a large University's computer network  |c Diana S.Dollivera, Adam K.Ghazi-Tehrania, Kevin T.Poorman 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This study investigated twelve categories of exploits targeting a large southern university to build a build a more robust cyberthreat profile for institutions of higher education. In one week, the university experienced 12.4 million external cyberattacks from 110 countries. Malware constituted 58% of all malicious activities. Attacks were statistically more likely to occur during the overnight hours of weekdays. Moreover, the majority of cyberattack activity was generated by a limited number of IP addresses originating from a handful of countries. Dutch-originating IP addresses were responsible for 71% of all cyberattacks in this study, and spyware attacks almost exclusively originated from a single IP address in the U.S. 
650 4 |a Cyberattacks 
650 4 |a Cybersecurity 
650 4 |a Universities 
650 4 |a Malware 
650 4 |a Routine Activity Theory 
700 1 |a Ghazi-Tehrania, Adam K.  |e VerfasserIn  |4 aut 
700 1 |a Poorman, Kevin, T.  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t International journal of law, crime and justice  |d Oxford : Elsevier, 2008  |g 66(2021), Artikel-ID 100484  |h Online-Ressource  |w (DE-627)559427743  |w (DE-600)2412511-8  |w (DE-576)278242537  |x 1756-0616  |7 nnas 
773 1 8 |g volume:66  |g year:2021  |g elocationid:100484 
856 4 0 |u http://doi.org/10.1016/j.ijlcj.2021.100484  |x Verlag  |z lizenzpflichtig  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4000150839 
LOK |0 003 DE-627 
LOK |0 004 1776482913 
LOK |0 005 20211109143408 
LOK |0 008 211109||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krub 
ORI |a SA-MARC-krimdoka001.raw