Information security economics: cyber security threats

نویسندگان

چکیده

Abstract This article takes into consideration cyber security economics to understand whether and is a partnership among equals or any of these two disciplines have the upper hand. Cyber more than just computer science, studies in holistic way, it dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument that there no clear definition cybersecurity, apart from set protocols are highly technical, when comes Gordon-Loeb model provides good picture on general image over industry, yet, much ignored, as costs attack succeed huge, save hidden other externalities. Apart regulation establishing common ground, information an under researched field interest, especially digital sovereignty act about be voted for, together with rules Information security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating Cyber Security Threats:

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

متن کامل

Preparing for Cyber Threats with Information Security Policies

Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The sce...

متن کامل

Cyber Security Threats Detection Using Ensemble Architecture

This paper describes an ensemble design for cyber security threats detection, which fuses the results from multiple classifiers together to make a final assessment decision. For promoting both speed and accuracy in the detection performance, only some of the features in traffic data are selected for each base classifier. In the kernel of each classifier, we combine Dempster-Shafer theory with k...

متن کامل

From information security to cyber security

The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of ...

متن کامل

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ... International Conference on Business Excellence

سال: 2022

ISSN: ['2502-0226', '2558-9652']

DOI: https://doi.org/10.2478/picbe-2022-0056