Supply Chain Cyber Security – Potential Threats
نویسندگان
چکیده
منابع مشابه
Investigating Cyber Security Threats:
This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...
متن کاملCyber Security Threats Detection Using Ensemble Architecture
This paper describes an ensemble design for cyber security threats detection, which fuses the results from multiple classifiers together to make a final assessment decision. For promoting both speed and accuracy in the detection performance, only some of the features in traffic data are selected for each base classifier. In the kernel of each classifier, we combine Dempster-Shafer theory with k...
متن کاملThe Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Security: An International Journal
سال: 2013
ISSN: 0861-5160,1314-2119
DOI: 10.11610/isij.2904