نتایج جستجو برای: cyber risk
تعداد نتایج: 957999 فیلتر نتایج به سال:
The art of warfare in cyberspace is evolving. Cyberspace, as the newest warfighting domain, requires the tools to synchronize effects from the cyber domain with those of the traditional land, maritime, space, and air domains. Cyberspace can compliment a commander’s theater strategy supporting strategic, operational, and tactical objectives. To be effective, or provide an effect, commanders must...
a r t i c l e i n f o Keywords: cyber-bullying cyber-victimization university students personality profile psychological symptoms online aggression The present study investigated the psychological profile of 430 Greek university students who reported cyber-bullying/victimization experiences. Participants completed a self-report questionnaire, measuring cyber-bullying, cyber-victimization, Inter...
insurers have in the past few decades faced longevity risks - the risk that annuitants survive more than expected - and therefore need a new approach to manage this new risk. in this dissertation we survey methods that hedge longevity risks. these methods use securitization to manage risk, so using modern financial and insurance pricing models, especially wang transform and actuarial concepts, ...
Abstract We use the world’s largest publicly available dataset of operational risk to model cyber losses and show that Tweedie best fits loss severity in financial industry. Three key determinants are firm size, contagion legal liability. also measure size based on estimation results a large degree heterogeneity across firms. The particularly relevant with respect recent discussion simplifying ...
The purpose of this paper is to analyze and describe the strategy Indonesian government in mitigating risk dealing threat cyber warfare. This uses qualitative method using 3 indicators mitigation theory consisting prevention, indentification remedy interpret problem explain it more detail by collecting data from literature studies. Cyber defense refers policies processes put place an institutio...
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks increase the level of security, safety and trustworthiness, prevent failure developments, minimize losses. It necessary analyze CPS configuration an automatic mode detect most vulnerable components reconfigure or replace them promptly. In this paper, we pres...
On synergies of cyber and physical security modelling in vulnerability assessment of railway systems
The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential aspects and interrelations among physical and cyber components. Like the systems themselves, security threats feature both cyber and physical elements. Although to apply divide et impera approaches helps handling system complexity, to consider just one aspect at a time does not provide adequate ri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید