This is not a Wikipedia article: It is an individual user's work-in-progress page, and may be incomplete and/or unreliable. For guidance on developing this draft, see Wikipedia:So you made a userspace draft. Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Business process compromise Business process compromise is a type of targeted cyber attack that silently manipulates an organization's processes or machines for the attacker's benefit, usually monetary. Often viictims think that operations are proceeding as usual when in fact an attacker is profiting from the manipulation.
References
editExternal links
edit