Academic literature on the topic 'Cybersecurity Measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity Measures"

1

Kissoon, Tara. "Optimum spending on cybersecurity measures." Transforming Government: People, Process and Policy 14, no. 3 (2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.

Full text
Abstract:
Purpose This purpose of this paper is to provide insight through analysis of the data collected from a pilot study, into the decision-making process used by organizations in cybersecurity investments. Leveraging the review of literature, this paper aims to explore the strategic decisions made by organizations when implementing cybersecurity controls, and identifies economic models and theories from the economics of information security, and information security investment decision-making process. Using a survey study method, this paper explores the feasibility for development of a strategic de
APA, Harvard, Vancouver, ISO, and other styles
2

Talekar, P. R. "Cybersecurity Measures for Financial Data." International Journal of Advance and Applied Research 5, no. 10 (2024): 1–5. https://doi.org/10.5281/zenodo.11296420.

Full text
Abstract:
This article looks at a comprehensive approach to improving financial data cybersecurity. The safeguarding of sensitive information is critical in an era of rising digital transactions and interconnected financial systems. The report looks into fundamental measures for strengthening cyber defenses, including encryption, multi-factor authentication, and strong network architecture. It also emphasizes the importance of personnel training, frequent audits, and incident response plans in establishing a robust security system. Organizations may confidently traverse the complicated world of financia
APA, Harvard, Vancouver, ISO, and other styles
3

Nnenna, Ugwu Jovita, Ugwuanyi Ifeoma Perpetua, Asuma Mariita Nchaga, Tushabe Hadijah, Eric Mabonga, and Tom Ongesa Nyamboga. "Cybersecurity Measures in East African EGovernment Systems." IAA JOURNAL OF SOCIAL SCIENCES 10, no. 2 (2024): 12–24. http://dx.doi.org/10.59298/iaajss/2024/102.122400000.

Full text
Abstract:
This paper provides a comprehensive examination of cybersecurity measures within e-government systems in East Africa. It begins with an overview of the importance of cybersecurity in e-government, emphasizing the need to protect sensitive data and ensure the integrity of digital services. The paper then explores key aspects of cybersecurity, including risk assessment and management, data encryption, firewalls, intrusion detection/prevention systems, access control, and security awareness training. Each section highlights the significance of these measures in enhancing the security and resilien
APA, Harvard, Vancouver, ISO, and other styles
4

Sharma, Ravinder, and Rajvir Saini. "Analysis for Network Security Measures for Protecting Organizational Data." Journal of Lifestyle and SDGs Review 4, no. 4 (2024): e03599. http://dx.doi.org/10.47172/2965-730x.sdgsreview.v4.n04.pe03599.

Full text
Abstract:
Objectives: The number, severity, and sophistication of cybersecurity incidents are rising, suggesting that the next generation of cybersecurity threats cannot be fully mitigated by technical security controls alone. In order to strengthen cybersecurity in this day and age, end users must practise proper cyber hygiene. Methods: According to research, social culture affects reducing cybersecurity risk. The majority of research on the topic has been conducted in other nations, therefore it's possible that findings won't apply to India because of its distinct social and cultural norms. There is a
APA, Harvard, Vancouver, ISO, and other styles
5

Ross, Lester, and Kenneth Zhou. "China issues new cybersecurity review measures." Journal of Investment Compliance 22, no. 1 (2021): 47–52. http://dx.doi.org/10.1108/joic-10-2020-0039.

Full text
Abstract:
Purpose To describe and analyze the implications of the new Measures (the “Measures”) for Cybersecurity Review jointly promulgated on April 27, 2020 by twelve Chinese government departments led by the Cyberspace Administration of China (CAC). Design/methodology/approach Defines the scope of the Measures, explains the functions and obligations of critical information infrastructure operators (each, a CIIO), outlines the self-assessment and cybersecurity review process and discusses the implications of the Measures for foreign companies doing business in China. Findings The Measures impose an ob
APA, Harvard, Vancouver, ISO, and other styles
6

M. Kolesnikova. "Key Cybersecurity Measures in African Countries." International Affairs 68, no. 005 (2022): 140–44. http://dx.doi.org/10.21557/iaf.80763118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mishra, Neha. "The Trade: (Cyber)Security Dilemma and Its Impact on Global Cybersecurity Governance." Journal of World Trade 54, Issue 4 (2020): 567–90. http://dx.doi.org/10.54648/trad2020025.

Full text
Abstract:
Governments are adopting various measures to address cybersecurity-related concerns. Some of these measures restrict cross-border flows of digital services/data, and thus inconsistent with obligations in trade agreements such as General Agreement on Trade in Services (‘GATS’). However, certain governments might argue that such measures are justified under the GATS security exception (Art. XIVbis) as they protect national security. This article investigates whether GATS Art. XIVbis is relevant in justifying cybersecurity measures and its potential impact on cybersecurity governance. It argues t
APA, Harvard, Vancouver, ISO, and other styles
8

Olamide Raimat Amosu, Praveen Kumar, Yewande Mariam Ogunsuji, Adesola Adelaja, Oladapo Faworaja, and Kikelomo Adetula. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. http://dx.doi.org/10.30574/wjarr.2024.23.2.2408.

Full text
Abstract:
This study explores developing and implementing advanced cybersecurity protocols to protect customer data and ensure secure transactions within the retail industry. By setting a high standard for data protection, these measures contribute significantly to national cybersecurity efforts. The research analyzes current threats, evaluates existing cybersecurity frameworks, and proposes robust protocols to mitigate potential risks. The findings demonstrate that enhanced cybersecurity measures safeguard sensitive information, reinforce consumer trust, and comply with regulatory requirements. For ins
APA, Harvard, Vancouver, ISO, and other styles
9

Olamide, Raimat Amosu, Kumar Praveen, Mariam Ogunsuji Yewande, Adelaja Adesola, Faworaja Oladapo, and Adetula Kikelomo. "Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 890–900. https://doi.org/10.5281/zenodo.14848480.

Full text
Abstract:
This study explores developing and implementing advanced cybersecurity protocols to protect customer data and ensure secure transactions within the retail industry. By setting a high standard for data protection, these measures contribute significantly to national cybersecurity efforts. The research analyzes current threats, evaluates existing cybersecurity frameworks, and proposes robust protocols to mitigate potential risks. The findings demonstrate that enhanced cybersecurity measures safeguard sensitive information, reinforce consumer trust, and comply with regulatory requirements. For ins
APA, Harvard, Vancouver, ISO, and other styles
10

Anwuli Nkemchor Obiki-Osafiele, Edith Ebele Agu, and Njideka Rita Chiekezie. "Protecting digital assets in Fintech: Essential cybersecurity measures and best practices." Computer Science & IT Research Journal 5, no. 8 (2024): 1884–96. http://dx.doi.org/10.51594/csitrj.v5i8.1449.

Full text
Abstract:
Cybersecurity is paramount for protecting digital assets and maintaining consumer trust in the rapidly evolving fintech sector. This review paper explores essential cybersecurity measures and best practices, focusing on encryption, multi-factor authentication, security audits, secure software development, and network security. The paper also examines the threat landscape, highlighting common cyber threats such as phishing, malware, insider threats, and data breaches and their impact on fintech operations. Future trends in fintech cybersecurity, including the role of emerging technologies like
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity Measures"

1

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Full text
Abstract:
In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process
APA, Harvard, Vancouver, ISO, and other styles
2

Gcaza, Noluxolo. "A national strategy towards cultivating a cybersecurity culture in South Africa." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.

Full text
Abstract:
In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to and share information. Technology has transformed the way the business world operates by introducing new ways of trading goods and services whilst bolstering traditional business methods. It has also altered the way nations govern. Thus individuals, organisations and nations are relying on this technology to perform significant functions. Alongside the positive innovations afforded by cyberspace, however, those who use it are exposed t
APA, Harvard, Vancouver, ISO, and other styles
3

Cheung, Kam Fung. "A Three Stage Approach to Cybersecurity Management for Logistics." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24945.

Full text
Abstract:
The logistics industry is benefiting from the fast-growing cyberspace, but is also increasing its exposure to cyberattacks. Interest in cybersecurity in logistics and supply chain management has grown, but this has not been matched by academic research. This thesis aims to develop a methodology to enhance cybersecurity in an interdependent digital logistics network. The methodology proposed in this thesis consists of three stages: The precautionary planning stage, the real-time recovery planning stage and the aftermath recovery planning stage. In the precautionary planning stage, this study
APA, Harvard, Vancouver, ISO, and other styles
4

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Full text
Abstract:
A malicious actor often relies on security vulnerabilities of IT systems to launch a cyber attack. Most cloud services are supported by an orchestration of large and complex systems which are prone to vulnerabilities, making threat assessment very challenging. In this research, I developed formal and practical ontology-based techniques that enable automated evaluation of a cloud system's security threats. I use an architecture for threat assessment of cloud systems that leverages a dynamically generated ontology knowledge base. I created an ontology model and represented the components of a cl
APA, Harvard, Vancouver, ISO, and other styles
5

Cornel, Caralea May. "A Methodology to Measure the Impact of Diversity on Cybersecurity Team Effectiveness." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8594.

Full text
Abstract:
In recent years, the definition of cybersecurity professional has been diluted to include more individuals, particularly women, to be included. Depending on the definition used, women currently comprise between 11% and 25% of the cybersecurity workforce. While multiple studies have indicated the benefits to diverse teams, research in the cybersecurity area is lacking.This research proposes a framework that uses a modified escape-the-room gamified scenario to measure the effectiveness of cybersecurity teams in technical problem-solving. The framework presents two routes, incident response and p
APA, Harvard, Vancouver, ISO, and other styles
6

Rodrigue, Tiina K. O. "The Power and Politics of Cybersecurity: A Quantitative Study of Federal Cash Windfall Allocation as a Measure of Impact on Comprehensive Cybersecurity Posture." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28152128.

Full text
Abstract:
In their attempts to create a comprehensive cybersecurity posture, chief information security officers (CISOs) can only be as effective as the resources they garner. In the federal context, budgets and spends are ultimately under the auspices of the agency heads who set priorities and direction. This study sought to gain insight on the impact of organizational power and politics in the cybersecurity post-budgetary process within U.S. federal government agencies through a comparative examination of budgeted versus actual spending. It addressed one research question: To what extent do power and
APA, Harvard, Vancouver, ISO, and other styles
7

Gwala, Sizwe. "Barriers to implementation of the (SA) National Cybersecurity Policy Framework." Thesis, 2016. https://hdl.handle.net/10539/23802.

Full text
Abstract:
Thesis (M.M. (Security))--University of the Witwatersrand, Faculty of Commerce, Law and Management, Graduate School of Public and Development Management, 2016<br>Technological advancement have seen South African government departments, state owned entities and private companies using cyberspace as a platform of interaction and the storage of information. Technological advancements have a positive impact due to the compression of space, time and thereby ensuring fastpaced interaction across borders. These technological advancements have, however resulted in most organisations, both private and
APA, Harvard, Vancouver, ISO, and other styles
8

Patala, Najiyabanu Noormohmed. "Cybersecurity framework for cloud computing adoption in rural based tertiary institutions." Diss., 2018. http://hdl.handle.net/11602/1362.

Full text
Abstract:
MCom (Business Information Systems)<br>Department of Business Information Systems<br>Although technology is being progressively used in supporting student learning and enhancing business processes within tertiary institutions, certain aspects are hindering the decisions of cloud usage. Among many challenges of utilizing cloud computing, cybersecurity has become a primary concern for the adoption. The main aim of the study was to investigate the effect of cloud cyber-security usage at rural based tertiary institutions in order to compare the usage with an urban-based institution and propose a c
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity Measures"

1

Pino, Robinson E. Network science and cybersecurity. Springer Science+Business Media, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cheong, Damien Dominic. Cybersecurity: Some critical insights and perspectives. RSIS, S. Rajaratnam School of International Studies, Nanyang Technological University, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

American Bar Association. Section of Science & Technology Law, ed. Legal guide to cybersecurity research. American Bar Association, Section of Science & Technology Law, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Toscana, Romana. Cybersecurity: The Beginner's Guide to Cybersecurity Measures. Indy Pub, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Optimal Spending on Cybersecurity Measures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ellis, Ryan, and Vivek Mohan. Rewired: Cybersecurity Governance. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ellis, Ryan, and Vivek Mohan. Rewired: Cybersecurity Governance. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brooks, Charles J., Philip Craig, Christopher Grow, and Donald Short. Cybersecurity Essentials. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brooks, Charles J., Philip Craig, Christopher Grow, and Donald Short. Cybersecurity Essentials. Wiley & Sons, Limited, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

New Solutions for Cybersecurity. MIT Connection Science & Engineering, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity Measures"

1

Kissoon, Tara. "Cybersecurity Principles." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al-khateeb, Samer, and Nitin Agarwal. "Social Network Measures and Analysis." In SpringerBriefs in Cybersecurity. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13690-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kissoon, Tara. "Cybersecurity risk-management framework." In Optimal Spending on Cybersecurity Measures. Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587576-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003527213-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thompson, Eric C. "Selecting Security Measures." In Building a HIPAA-Compliant Cybersecurity Program. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kissoon, Tara. "Data Protection Impact Assessment." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kissoon, Tara. "Governance." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity Measures"

1

Khare, Shanu, and Navjot Singh Talwandi. "Securing Satellite Communication: Exploring Cybersecurity Measures in Satellite Networks." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Rishabh, and Abhishek Singla. "Optimizing Cloud Security: A Study of Effective Cybersecurity Measures for Organizations." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hammer Né Bauer, Sergei, and Peter Schartner. "Functional Safety Evaluation for Cybersecurity Measures in Low-End Automotive Control Units." In 2024 11th International Conference on Dependable Systems and Their Applications (DSA). IEEE, 2024. https://doi.org/10.1109/dsa63982.2024.00023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Tariq Emad, Mohd Najwadi Yusoff, Yung-Wey Chong, Mohd Heikal Husin, and Noor Farizah Ibrahim. "Enhanced Cybersecurity Measures: DDoS Attacks Detection in Realtime with Advanced SVM Techniques." In 2024 7th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2024. https://doi.org/10.1109/isriti64779.2024.10963367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wahed, Mutaz Abdel, Mowafaq Salem Alzboon, Muhyeeddin Alqaraleh, Azmi Halasa, Mohammad Al-Batah, and Ahmad Fuad Bader. "Comprehensive Assessment of Cybersecurity Measures: Evaluating Incident Response, AI Integration, and Emerging Threats." In 2024 7th International Conference on Internet Applications, Protocols, and Services (NETAPPS). IEEE, 2024. https://doi.org/10.1109/netapps63333.2024.10823603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saravanan, T. M., A. Muthusamy, C. P. Thamil Selvi, M. Senthil Kumar, and D. Maheshwari. "Improving Cybersecurity Measures Through the Revelation of Malignant URLs using Machine Learning Techniques." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Geetha, B. T., Mohammed Usman, Neetu Randhawa, Lalit Pipliwal, Kajal Maheshwari, and Neha Kapila. "Revolutionizing the Dynamics of Digital Marketing by Including Cybersecurity Measures and Safeguarding Consumer Data." In 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies (TQCEBT). IEEE, 2024. http://dx.doi.org/10.1109/tqcebt59414.2024.10545098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

U, Sreekumar, Urmila Patil, and Rajashree R. Bhokre. "Cybersecurity and Functional Safety Measures Need to be Introduced in the Communication Protocol between EV and EVSE." In 2025 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI). IEEE, 2025. https://doi.org/10.1109/iatmsi64286.2025.10984548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chipuriro, Francisca, Sam Takavarasha, and Benny Nyambo. "Exploring the Cybersecurity Measures Implemented by Internet Service Providers (ISPs) to Mitigate Cyberthreats: A Systematic Literature Review." In 2024 3rd Zimbabwe Conference of Information and Communication Technologies (ZCICT). IEEE, 2024. https://doi.org/10.1109/zcict63770.2024.10958504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bolun, Ion. "Prioritization of Cybersecurity Measures." In 11th International Conference on “Electronics, Communications and Computing". Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2021/sec.01.

Full text
Abstract:
The considerable losses caused by the low levelof cyber security of companies, institutions and so on and the limited financial resources available imply the need to prioritize the implementation of measures to counter cyber attacks. For this purpose, the respective optimization problem is formulated as a Boolean mathematical programming one. At large dimensions, the use of known methods of solving the problem requires a large volume of calculations. That’s why, a simple rule for approximately solving the problem is obtained. By computer simulation, it is shown that the error of the solution w
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity Measures"

1

Hariharan, Anand, and Masatake (Masa) Yamamichi. Basic Tool Kit for Cybersecurity in Education Management Information Systems. Asian Development Bank, 2024. http://dx.doi.org/10.22617/wps240301-2.

Full text
Abstract:
The increased reliance on online schooling modalities calls for provision of sufficient security in education management information systems (EMIS). Addressing cybersecurity-related issues is imperative for continuity of education service delivery and resilience of education systems. In case of any cybersecurity threat materializing, an EMIS must recover and be functional within an acceptable period and level of data loss. This tool kit provides guidance for decision-makers and practitioners on how to formulate strategies and implement cybersecurity measures in an EMIS, what cybersecurity issu
APA, Harvard, Vancouver, ISO, and other styles
2

Taiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, 2020. http://dx.doi.org/10.4271/epr2020026.

Full text
Abstract:
Quantum computing is considered the “next big thing” when it comes to solving computational problems impossible to tackle using conventional computers. However, a major concern is that quantum computers could be used to crack current cryptographic schemes designed to withstand traditional cyberattacks. This threat also impacts future automated vehicles as they become embedded in a vehicle-to-everything (V2X) ecosystem. In this scenario, encrypted data is transmitted between a complex network of cloud-based data servers, vehicle-based data servers, and vehicle sensors and controllers. While the
APA, Harvard, Vancouver, ISO, and other styles
3

Saalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Crossover and Its Escalatory Risks for Europe. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/siep1930.

Full text
Abstract:
The crossover between cybercrime and cyberwarfare has intensified in recent years, particularly against the backdrop of the ongoing conflict in Ukraine and mounting tensions of China and Russia with the United States. This paper delves into specific cyber incidents that employ cybercrime tactics with cyberwarfare objectives, allegedly involving Chinese, Russian or US actors. It examines responses within and among the private sector, the public sector and international forums. Although not directly involved in all of the cases, the European Union (EU) was impacted in a variety of ways, both as
APA, Harvard, Vancouver, ISO, and other styles
4

Reducing Cybersecurity Risks at the Organization’s Endpoints: Cybersecurity Best Practices. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013085.

Full text
Abstract:
This publication presents a series of measures that allow for the protection of physical devices, such as desktop computers and mobile devices, that connect to an organizations network system, commonly referred to as “endpoints” of the network, by establishing security protocols based on physical security and access prevention, permission management, information protection, and software implementation. The document refers to a wide range of endpoints, irrespective of their operating system, terminal type, or where they connect from within the organization, with readers being able to implement
APA, Harvard, Vancouver, ISO, and other styles
5

In Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, 2022. http://dx.doi.org/10.1061/infographic.000003.

Full text
Abstract:
rsecurity into the current practices of the public water infrastructure sector? ASCE collection on cybersecurity in water distribution networks Overview of smart water networks, their advantages and weaknesses, and growing challenges in securing resilience Lessons learned from past cybersecurity incidents AI-based algorithms for detecting and localizing cyber attacks Integrating cyber attacks into resilience and risk assessment procedures and emergency response measures Analyzing different types of cyber-physical attacks and their effects Modeling and simulation methodologies for managing wate
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!