Organised Firestorm as strategy for business cyber-attacks

01/04/2023
by   Andrea Russo, et al.
0

Having a good reputation is paramount for most organisations and companies. In fact, having an optimal corporate image allows them to have better transaction relationships with various customers and partners. However, such reputation is hard to build and easy to destroy for all kind of business commercial activities (B2C, B2B, B2B2C, B2G). A misunderstanding during the communication process to the customers, or just a bad communication strategy, can lead to a disaster for the entire company. This is emphasised by the reaction of millions of people on social networks, which can be very detrimental for the corporate image if they react negatively to a certain event. This is called a firestorm. In this paper, I propose a well-organised strategy for firestorm attacks on organisations, also showing how an adversary can leverage them to obtain private information on the attacked firm. Standard business security procedures are not designed to operate against multi-domain attacks; therefore, I will show how it is possible to bypass the classic and advised security procedures by operating different kinds of attack. I also propose a different firestorm attack, targeting a specific business company network in an efficient way. Finally, I present defensive procedures to reduce the negative effect of firestorms on a company.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/22/2020

An application of cyberpsychology in business email compromise

This paper introduces Business Email Compromise (BEC) and why it is beco...
research
07/09/2020

Application of LEAN Principles to Improve Business Processes: a Case Study in Latvian IT Company

The research deals with application of the LEAN principles to business p...
research
10/20/2020

What is Lead Generation? Strategy and Best Practices

Learn how lead generation fits into your inbound #marketing strategy and...
research
06/29/2021

Design an IT Policy Implementation Plan

Information technology (IT) companies implement multi-dimensional policy...
research
03/28/2014

A Mining Method to Create Knowledge Map by Analysing the Data Resource

The fundamental step in measuring the robustness of a system is the synt...
research
10/22/2021

"It may be a pain in the backside but..." Insights into the impact of GDPR on business after three years

The General Data Protection Regulation (GDPR) came into effect in May 20...
research
11/27/2019

Learning a faceted customer segmentation for discovering new business opportunities at Intel

For sales and marketing organizations within large enterprises, identify...

Please sign up or login with your details

Forgot password? Click here to reset