Skip to main content
Engineering LibreTexts

9.1 Malicious Attacks

  • Page ID
    89926
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    The cyber-attacks are becoming very common now a days and nothing (Digital Systems) is 100% safe. The main reason of this dilemma is the presence of the juvenile hackers and script kiddies. In 2016, US law enforcement authorities sent a college student to prison for 20 years for hacking the US Vice presidential candidate’s email account. There are many other similar hacking and data breaches examples. Although, these attacks grabbed the attention of news, media and public however, because of brand image & stocks most of the victims of these attacks don’t publicize these attacks at all. 

    In 2013, Bloomsburg identified the top hacking countries, from where most of the security attacks are coming. In Bloomsburg’s ranking, China was at the top with 41%, US ranked at 2nd with 10%, Turkey and Russian were placed at 3rd & 4th positions with 4.7% & 4.3% respectively. However, it doesn’t mean that these countries have more hackers or security attackers but could have more proxy servers.


    9.1 Malicious Attacks is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?