An International Comparative Study on Cyber Security Strategy
نویسندگان
چکیده
منابع مشابه
Cert Data to Analyze International Cyber Security
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cybersecurity data publicly provided by nation-level Computer Emerg...
متن کاملAn Empirical Study of Cyber Security Perceptions, Awareness and Practice
This paper examines the perceptions, knowledge, and experience of security practices of users. A survey instrument was developed and administered to undergraduate students at a small private university. The results of this survey are presented, and the implications of these result discussed.
متن کاملCyber Security as a Central Strategy for Smart Community
The cyber threat landscape has evolved in fairly dramatic ways. Cyber threats come in various different forms both technical and content related threats. Emerging threats have become sophisticated and a lot more disastrous involving state actors, state-sponsored actors, international organized criminals and Internet hacker activist groups. Today‘s cyber threats pose challenges to the Government...
متن کاملA Detailed Strategy for Managing Corporation Cyber War Security
Modern corporations depend heavily on information and communication technologies and are becoming increasingly interconnected locally and internationally. This interconnectedness and dependency on information technology make corporations vulnerable to cyber attacks. Corporate managers therefore need to understand the growing cyber war threats and implement appropriate strategies to mitigate the...
متن کاملFormalizing Agents' Beliefs for Cyber-Security Defense Strategy Planning
Abstract. Critical information infrastructures have been exposed to an increasing number of cyber attacks in recent years. Current protection approaches consider the reaction to a threat from an operational perspective, but leave out human aspects of an attacker. The problem is, no matter how good a defense planning from an operational perspective is, it must be considered that any action taken...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2015
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2015.9.2.02