Results 31 to 40 of about 251,419 (115)
The purpose of this article is to develop a model for an access control policy and to formulate a method for creating a model of information security threat scenarios in industrial control system (ICS).
Muhannad O. Zaid Alkilani +1 more
doaj +1 more source
Transformations to achieve the Sustainable Development Goals Includes the SDG Index and Dashboards. Sustainable Development Report 2019 [PDF]
The Sustainable Development Report 2019 presents an updated SDG Index and Dashboards with a refined assessment of countries’ distance to SDG targets. The report has been successfully audited for the first time by the European Commission Joint Research ...
Fuller, G. +4 more
core
The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement.
Hwang, Junseok, Syamsuddin, Irfan
core +1 more source
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
The article reveals the impact of digital transformation on the efficiency of management of financial and operational risks, and on the resilience of the Ukrainian banking system.
T. H. Bondaruk, O. S. Bondaruk
doaj +1 more source
Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure
This research has two parts; the first is to identify enterprise Hyperledger Fabric (HLF) blockchain cybersecurity vulnerabilities, threats, and legal obligations in a Post-Quantum Cryptography (PQC) world.
Robert Campbell
doaj +1 more source
Objective. The purpose of the study is to theoretically analyze security defects and study the criticality of vulnerabilities in software used in modern automated systems of internal affairs agencies.Method.
I. G. Drovnikova, A. D. Popova
doaj +1 more source
Does “See Something, Say Something” Work? [PDF]
Do “See Something, Say Something” programs work? The evidence strongly suggests that in the specific case of public surface transportation, the answer is “yes.” Transport staff and passengers play an important role in the prevention of terrorist attacks.
Butterworth, Bruce R. +1 more
core +1 more source
Risk Management Guide for Information System Infrastructure in Digital Banking
Digital banks rely heavily on IT infrastructure to support digital services, data management, and transaction processing, making them vulnerable to risks such as system failures, cybersecurity threats, and regulatory compliance.
Raden Budiraharjo +3 more
doaj +1 more source
Global Health Security in an Era of Explosive Pandemic Potential [PDF]
Pandemics pose a significant risk to security, economic stability, and development. Annualized expected losses from pandemics are estimated at $60 billion per year. Despite the certainty and magnitude of the threat, the global community has significantly
Ayala, Ana, Gostin, Lawrence O.
core +1 more source

