نتایج جستجو برای: cyber insurance

تعداد نتایج: 67748  

2015
RANJAN PAL LEANA GOLUBCHIK KONSTANTINOS PSOUNIS

Recent work in security has illustrated that solutions aimed at detection and elimination of security threats alone are unlikely to result in a robust cyberspace. As an orthogonal approach to mitigating security problems, some have pursued the use of cyber-insurance as a suitable risk management technique. Such an approach has the potential to jointly align the incentives of security vendors (e...

Journal: :IJCWT 2012
Natalia Tereshchenko

What is cyber terrorism? The paper will examine how the fundamentalist interpretation of the Quran may affect the non-state actors’ terrorist approach to the cyber domain, the dangers of an assault and the possible side-effects in politics, international relations and the public domain. The author will approach the issue in political, legal and social terms, touching only slightly on issues suc...

2014
John N. Stewart

New techniques, tactics, and procedures (TTPs) are now available to strengthen security postures and become more resilient to cyber threats. Most of these technologies are accessible and affordable, and they are showing promising results. This paper exemplifies eight specific advanced techniques, tactics, and procedures to counter cyber threats, including using moving target architectures to co...

1997
Tatiana Ermolieva

Interim Reports on work of the International Institute for Applied Systems Analysis receive only limited review. Views or opinions expressed herein do not necessarily represent those of the Institute, its National Member Organizations, or other organizations supporting the work.

2009
Marthie Grobler Sebastiaan H. von Solms

The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model for forensically sound Live Forensic Acquisition, the Liforac model. The Liforac model presents a number of concepts that are already available within the Cyber Forensics dis...

Journal: :Computers & Security 2010
Jeffrey Carr

No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading inside cyber warfare mapping the cyber underworld is also a way as one of the collective books that gives many advantages. The a...

2016
Hanns-Thomas Kopf

Cyber-Kriminalität bzw. Cyber-Attacken auf Personen, Unternehmen, kritische Infrastrukturen bis hin zu Staaten werden zu neuen Waffen unserer Zivilisation. Terror ist eine allgegenwärtige Bedrohung unserer Zeit. Kein Tag vergeht, an dem man nicht in der Berichterstattung darauf stößt und damit konfrontiert ist. Mobile Kommunikationstechnologien und deren flächendeckende Verbreitung führen darüb...

2011
Elfadil Sabeil Azizah Bt Abdul Manaf Zuraini Ismail Mohamed Abas

Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...

Journal: :The Geneva Papers on Risk and Insurance - Issues and Practice 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید