Results 151 to 160 of about 37,859 (190)
A Model for B2B IT Security: Multilayer Defense Facing Interdependent Cyber Risk
Tridib Bandyopadhyay
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Network Security, 2014
This chapter focuses on the understanding and skills needed by tomorrow's business leaders, namely understanding what security teams do and why security is so challenging based on external influences such as cyber espionage, warfare, and crime, which are currently having an adverse impact on the trust that customers have on the Internet and e-Business ...
openaire +2 more sources
This chapter focuses on the understanding and skills needed by tomorrow's business leaders, namely understanding what security teams do and why security is so challenging based on external influences such as cyber espionage, warfare, and crime, which are currently having an adverse impact on the trust that customers have on the Internet and e-Business ...
openaire +2 more sources
Anticipation in Cyber-security
2017Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may range from threatening the foundation of modern information society, to causing catastrophic failure of nation-wide critical infrastructure. As a result, a great deal of effort has been given to mitigating the risks stemming from cyber-attacks and has ...
Ahrend, JM, Jirotka, M
openaire +1 more source
2020
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
openaire +2 more sources
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
openaire +2 more sources

