Academic literature on the topic 'Cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity"
Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (August 2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.
Full textJohri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.
Full textAl Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (December 22, 2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.
Full textMaurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.
Full textRatnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.
Full textPullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.
Full textCACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.
Full textCampbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.
Full textBOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.
Full textDissertations / Theses on the topic "Cybersecurity"
Poluzzi, Lorenzo. "IA & Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textHoward, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.
Full textLingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.
Full textNilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.
Full textReid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Full textTagert, Adam C. "Cybersecurity Challenges in Developing Nations." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.
Full textFalco, Gregory J. "Cybersecurity for urban critical infrastructure." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 110-116).
Our cities are under attack. Urban critical infrastructure which includes the electric grid, water networks, transportation systems and public health and safety services are constantly being targeted by cyberattacks. Urban critical infrastructure has been increasingly connected to the internet for the purpose of operational convenience and efficiency as part of the growing Industrial Internet of Things (HoT). Unfortunately, when deciding to connect these systems, their cybersecurity was not taken seriously. A hacker can monitor, access and change these systems at their discretion because of the infrastructure's lack of security. This is not only a matter of potential inconvenience. Digital manipulation of these devices can have devastating physical consequences. This dissertation describes three steps cities should take to prepare for cyberattacks and defend themselves accordingly. First, cities must understand how an attacker might compromise its critical infrastructure. In the first chapter, I describe and demonstrate a methodology for enumerating attack vectors across a citys CCTV security system. The attack methodology uses established cybersecurity typologies to develop an attack ruleset for an Al planner that was programmed to perform attack generation. With this, cities can automatically determine all possible approaches hackers can take to compromise their critical infrastructure. Second, cities need to prioritize their cyber risks. There are hundreds of attack permutations for a given system and thousands for a city. In the second chapter, I develop a risk model for urban critical infrastructure. The model helps prioritize vulnerabilities that are frequently exploited for HoT Supervisory Control and Data Acquisition (SCADA) systems. Finally, cities need tools to defend themselves. In the third chapter, I present a nontechnical approach to defending against attacks called cyber negotiation. Cyber negotiation is one of several non-technical cyberdefense tools I call Defensive Social Engineering, where victims can use social engineering against the hacker. Cyber negotiation involves using a negotiation framework to defend against attacks with steps urban critical infrastructure operators can take before, during and after an attack. This study combines computer science and urban planning (Urban Science) to provide a starting point for cities to prepare for and protect themselves against cyberattacks.
by Gregory J. Falco.
Ph. D.
Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Full textTaiola, Matteo. "Cybersecurity in impianti dell'industria di processo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textSchluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textMalicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of the damage they cause there are indications that the seriousness of insider incidents are underappreciated as threats by management. The purpose of this research was to investigate who constitutes MI threats, why and how they initiate attacks, the extent to which MI activity can be modeled or predicted, and to suggest some risk mitigation strategies. The results reveal that addressing the Malicious Insider threat is much more than just a technical issue. Dealing effectively with the threat involves managing the dynamic interaction between employees, their work environment and work associates, the systems with which they interact, and organizational policies and procedures. Techniques for detecting and mitigating the threat are available and can be effectively applied. Some of the procedural and technical methods include definition of, follow through, and consistent application of corporate, and dealing with adverse events indigenous to the business environment. Other methods include conduct of a comprehensive Malicious Insider risk assessment, selective monitoring of employees in response to behavioral precursors, minimizing unknown access paths, control of the organization's production software baseline, and effective use of peer reporting.
Keywords: Cybersecurity, Professor Paul Pantani, CERT, insider, threat, IDS, SIEMS. FIM, RBAC, ABAC, behavioral, peer, precursors, access, authentication, predictive, analytics, system, dynamics, demographics.
Books on the topic "Cybersecurity"
Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.
Full textKumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.
Full textAbd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.
Full textBrooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.
Full textPrice, Tom. Cybersecurity. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 2015. http://dx.doi.org/10.4135/cqr_ht_cybersecurity_2015.
Full textMarshall, Patrick. Cybersecurity. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 2003. http://dx.doi.org/10.4135/cqrglobal20030926.
Full textDaim, Tugrul U., and Marina Dabić, eds. Cybersecurity. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-34843-3.
Full textMarshall, Patrick. Cybersecurity. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 2010. http://dx.doi.org/10.4135/cqresrre20100226.
Full textJøsang, Audun. Cybersecurity. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-68483-8.
Full textVerma, Rakesh M., and David J. Marchette. Cybersecurity Analytics. Boca Raton, FL : CRC Press, 2020. | Series: Chapman & Hall/CRC data science series: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429326813.
Full textBook chapters on the topic "Cybersecurity"
Wichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 669–80. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.
Full textWichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 1–13. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.
Full textWolfe, Jennifer C. "Cybersecurity." In Disruption in the Boardroom, 51–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.
Full textRefsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Full textRoy, Jeffrey. "Cybersecurity." In Public Administration and Information Technology, 59–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.
Full textJackson, Scott, and Ricardo Moraes dos Santos. "Cybersecurity." In Systems Approach to the Design of Commercial Aircraft, 57–60. First edition. | Boca Raton, FL : CRC Press, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.
Full textSiers, Rhea. "Cybersecurity." In Security Studies, 556–68. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.
Full textIslam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.
Full textZaffar, Ehsan. "Cybersecurity." In Understanding Homeland Security, 399–439. Abingdon, Oxon; New York. NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.
Full textMaclay, Walter N. "Cybersecurity." In Closing the Care Gap with Wearable Devices, 127–32. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003304036-17.
Full textConference papers on the topic "Cybersecurity"
Kyranoudi, Pinelopi, Nineta Polemi, Paresh Rathod, Ricardo Gregorio Lugo, Sotiris Ioannidis, and Paulinus Ofem. "Sectoral Cybersecurity Skills Gap: The Case of Maritime Cybersecurity Certification Training." In 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC), 1–9. IEEE, 2024. https://doi.org/10.1109/ice/itmc61926.2024.10794272.
Full textKemmerer, R. A. "Cybersecurity." In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.
Full textMaymí, Fernando J. "Cybersecurity." In SIGITE '19: The 20th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.
Full textAbdulla, Aysha, Omer Bin Hussain, and Numa Fatima. "Cybersecurity." In 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA). IEEE, 2024. http://dx.doi.org/10.1109/acdsa59508.2024.10467741.
Full textde Bruin, Rossouw, and S. H. von Solms. "Humanitarian perspective of cybersecurity and cybersecurity governance." In 2017 IST-Africa Week Conference (IST-Africa). IEEE, 2017. http://dx.doi.org/10.23919/istafrica.2017.8102388.
Full textMurphy, Diane R., and Richard H. Murphy. "Teaching Cybersecurity." In the 2013. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2528908.2528913.
Full textXu, Shouhuai. "Cybersecurity dynamics." In the 2014 Symposium and Bootcamp. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2600176.2600190.
Full textKhandpur, Rupinder Paul, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, and Naren Ramakrishnan. "Crowdsourcing Cybersecurity." In CIKM '17: ACM Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3132847.3132866.
Full textHolley, Buffie, Dan Garcia, and Julia Bernd. "Teaching Cybersecurity." In SIGCSE 2023: The 54th ACM Technical Symposium on Computer Science Education. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3545947.3569637.
Full textOhrimenco, Serghei, and Valeriu Cernei. "Cybersecurity risk." In Economic Security in the Context of Systemic Transformations, 3rd Edition. Academy of Economic Studies of Moldova, 2024. http://dx.doi.org/10.53486/escst2023.17.
Full textReports on the topic "Cybersecurity"
Florakis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. Cybersecurity Risk. Cambridge, MA: National Bureau of Economic Research, December 2020. http://dx.doi.org/10.3386/w28196.
Full textAlecu, Iulian, Costel Ciuchi, Toma Cimpeanu, Iulian Coman, Larisa Gabudeanu, Ioan-Cosmin Mihai, Cosmina Moghior, et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, January 2021. http://dx.doi.org/10.19107/cybersec.2021.en.
Full textGuice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Fort Belvoir, VA: Defense Technical Information Center, August 2014. http://dx.doi.org/10.21236/ada608802.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Gaithersburg, MD: National Institute of Standards and Technology, August 2017. http://dx.doi.org/10.6028/nist.sp.800-181.
Full textNIST, Gaithersburg MD. Using the Cybersecurity Framework to Minimize Emergent Cybersecurity Risk:. Gaithersburg, MD: National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.1331.ipd.
Full textWright, Virginia, and Marc Sachs. Engineering-In Cybersecurity. Office of Scientific and Technical Information (OSTI), March 2023. http://dx.doi.org/10.2172/1964083.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.
Full textNewhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.
Full textNewhouse, Bill. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Ukrainian translation). National Institute of Standard and Technology, May 2022. http://dx.doi.org/10.6028/nist.sp.800-181.ukr.
Full textNewhouse, William. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (French translation). Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-181.fre.
Full text