منابع مشابه
Cyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملCyber Reconnaissance: An Alarm before Cyber Attack
Today’s cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable to cyber thieves. Tod...
متن کاملAVOIDIT: A Cyber Attack Taxonomy
Cyber attacks have greatly increased over the years, where the attackers have progressively improved in devising attacks towards a specific target. To aid in identifying and defending against cyber attacks we propose a cyber attack taxonomy called AVOIDIT (Attack Vector, Operational Impact, Defense, Information Impact, and Target). We use five major classifiers to characterize the nature of an ...
متن کاملDeterrence, Influence, Cyber Attack, and Cyberwar
* Paul K. Davis is a senior principal researcher at the RAND Corporation and a professor of policy analysis in the Pardee RAND Graduate School. His early studies were in the hard sciences and he received a Ph.D. in theoretical chemical physics at M.I.T. After working on strategic technology and systems analysis at the Institute for Defense Analyses, he joined the U.S. government to work on stra...
متن کاملBig Data for Cyber-attack Management
Big Data has become big business. This paper explores a means of improving Cyber-security using Big Data technologies, ontology, and decision support for preventing or reducing losses from cyber-attacks. Because of the priority of this threat to national security it is necessary to attain results far superior to those found in modern-day security operations centers. Focus is on the potential ap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Technology Innovation Management Review
سال: 2014
ISSN: 1927-0321
DOI: 10.22215/timreview/846