Results 21 to 30 of about 205,649 (344)
Refining the PoinTER “human firewall” pentesting framework [PDF]
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core +3 more sources
The Internet: Where Did IT All Go Wrong?
It is hard to imagine life today without the Internet, and all of the benefits that it brings to our business and personal lives: convenient, cheap and instant communication across time zones and national boundaries; online shopping and banking; document
Robert Schifreen
doaj +1 more source
Hackerlık Kavramı, Modeller ve Medyada Hackerlığın Sunumu
Bu çalışmada hackerlık kavramının tarihsel süreç içinde yaşadığı değişimlerden bahsedilerek kavramın alanyazında ele alınış biçimlerinin bir modellemesi yapılmaya çalışılmıştır. Alanyazında temel olarak iki modelin yer aldığı saptanmıştır.
Serhat Çoban
doaj +1 more source
Socio-economic analysis of cybercrime [PDF]
In the presented article, the author analyzes socio-economic damage caused and expected as a result of cybercrime, a global and transnational threat. In parallel, with the development of technology and the growing dependence of the population on internet
Irakli Nadareishvili, Jemal Lomsadze
doaj +1 more source
GOTCHA password hackers! [PDF]
2013 ACM Workshop on Artificial Intelligence and Security (AISec)
Blocki, Jeremiah +2 more
openaire +2 more sources
Guerras culturais, hacking e as vulnerabilidades do jornalismo à desinformação
O artigo busca identificar vulnerabilidades do jornalismo que vêm sendo exploradas por grupos de interesse capazes de “hackear” as rotinas produtivas das redações para difundir desinformação.
Marcelo Träsel
doaj +1 more source
Hackers as terrorists? Why it doesn't compute [PDF]
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core +1 more source
Security Investment, Hacking, and Information Sharing between Firms and between Hackers
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain.
Kjell Hausken
doaj +1 more source
Predicting Cyber Events by Leveraging Hacker Sentiment
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok +2 more
core +1 more source
Thinking with the Animal-Hacker
In the depths of the Cumbria hills a dairy cow changes its route to stare deep into the camera lens of the ‘Environmental Virtual Observatory’ (EVO) (www.evo-uk.org).
Helen Pritchard
doaj +1 more source

