Many web sites and electronic infrastructures of organisations have various security vulnerabilities and are subject to cyberattacks with significant consequences on organisations. Successful cyberattacks lead to consequences which have a direct impact on organisations’ infrastructure, leading to Malfunction of the organisation’s electronic services, as well as other sectors. Successful attacks may lead to negative reputation among the other organisations as well as reduction of organisation’s prestige. Furthermore, an organisations may face legal issues in case of disclosure of personal information.
Attackers are exploiting possible vulnerabilities of the organisations websites and their electronic infrastructure. These vulnerabilities may occur due to various factors. The most common factor is websites may use a set of software which are not updated regularly, thus being vulnerable to cyberattacks (e.g., outdated versions of CMS software, vulnerable plugins, outdated versions of programming languages. Another factor is that organisation often do not take sufficient security (e.g., lack of firewall) which exposes the infrastructure to more attacks. Moreover, the infrastructure is not precautionarily tested with regards to their resistance to cyberattacks.
As a result, organisations are often targeted by attacker using a set of exploits like SQL Injection, XSS, CSRF, etc.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.