Listing 1 - 10 of 3096 << page
of 310
>>
Sort by

Book
Basiskennis informatiebeveiliging : op basis van ISO27001 en ISO27002
Authors: --- --- ---
ISBN: 9789401800136 Year: 2015 Publisher: Zaltbommel Van Haren

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
The Journal of The British Blockchain Association
Author:
ISSN: 25163949 25163957

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
ICT Security : Praktische beveiliging van computersystemen, digitale media en netwerkverbindingen
Author:
ISBN: 9789057523748 9057523744 Year: 2018 Publisher: Amsterdam Brinkman Uitgeverij

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The Language of Cyber Attacks : A Rhetoric of Deception.
Author:
ISBN: 1350354708 1350354716 1350354694 Year: 2024 Publisher: London : London : Bloomsbury Academic, Bloomsbury Publishing (UK),

Loading...
Export citation

Choose an application

Bookmark

Abstract

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages? This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication.


Periodical
Harvard Data Science Review
ISSN: 26442353

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles.
Authors: --- ---
ISBN: 1638280614 1638280606 Year: 2022 Publisher: Norwell, MA : Now Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians.Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles.CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.


Book
Building an effective security program.
Authors: --- ---
ISBN: 1501506528 1501506420 Year: 2020 Publisher: Boston, Massachusetts : DE GRUYTER,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.


Book
Securing the private sector : protecting US industry in pursuit of national security.
Author:
ISBN: 9781955055383 Year: 2022 Publisher: Boulder, CO : Lynne Rienner Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As a provider of vital infrastructure and technology, the private sector has become an essential contributor to US national security--and the target of hackers and terrorists. Darren Tromblay traces the evolution of an often fraught public-private partnership to explore how the complex web of intelligence agencies has struggled to protect critical economic and industrial interests.


Book
Cybersecurity : ambient technologies, IoT, and industry 4.0 implications
Authors: --- ---
ISBN: 1003145043 100044936X 1003145043 1000449378 Year: 2022 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This edited book discusses the evolution of IoT and Industry 4.0 and brings security and privacy related technological tools and techniques onto a single platform so that researchers, industry professionals, graduate, postgraduate students, and academicians can easily understand the security, privacy, challenges and opportunity concepts and make then ready to use for applications in IoT and Industry 4.0"--


Book
National Cybersecurity Protection Act of 2014.
Author:
Year: 2014 Publisher: [Washington, D.C.] : [U.S. Government Publishing Office],

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 3096 << page
of 310
>>
Sort by