نتایج جستجو برای: cyber risk
تعداد نتایج: 957999 فیلتر نتایج به سال:
The development and improvement of electronic communication instruments and means in postmodern societies with fast intention has caused further multiplication in meanings and content of the communication itself. On the other hand the involvement of cyber space in our privacy has caused massive personality changes in people particularly the youth, In a way that individuals are separated from re...
Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...
Purpose. The aim of the article is substantiation approaches domestic and foreign scientists to risk management in financial sector Ukraine context cyber threats need ensure national security post-pandemic economic recovery. Methodology research. General scientific special methods research are used article, particular: induction, deduction, abstraction - reveal essence concepts "cyber threat", ...
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the i...
Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of file storage server of an organization. Different kinds of security threats and a number of security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for evaluating cyber security of local storage systems in organizat...
In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. A security analyst is in charge of observing the online operations of a corporate network (e.g., an online retail company with an external webserver and an internal fileserver) from threats of random or organized cyber-attacks. The current work describes a cognitive Instance-based Learning (IBL...
! Most of the defense, corporate, and civilian systems today are Internet-based. The trustworthiness of these Internet-based systems heavily depends on their security characteristics. It has been forecasted by national defense experts that the next big terrorist threat is a cyber-war, alongside this, the current Obama administration has also given much importance to strengthening cyber-security...
OBJECTIVE To estimate the prevalence of cyber dating abuse among youth aged 14 to 19 years seeking care at school-based health centers and associations with other forms of adolescent relationship abuse (ARA), sexual violence, and reproductive and sexual health indicators. METHODS A cross-sectional survey was conducted during the 2012-2013 school year (participant n = 1008). Associations betwe...
2 Advanced cyber threats present a challenge to established engineering and strategic analysis processes: established processes, to facilitate cost-effective risk management.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید