Evaluating Database Security and Cyber Attacks: A Relational Approach
نویسندگان
چکیده
منابع مشابه
SCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملDeveloping a Complex Simulation Environment for Evaluating Cyber Attacks
The management of oil exploration is among the most important strategic tasks that a nation has. In Brazil, the Campos Basin is a petroleum rich area compassing oceanic fields that accounts for 80% of Brazil's oil production. Because the Campos Basin is offshore, there is a high volume of helicopter traffic in the area. Currently, the Department of Airspace Control, that manages the Brazilian A...
متن کاملEvaluating Cyber Security Awareness in South Africa
In many ways, the internet and cyber world is a dangerous place where innocent users can inadvertently fall prey to shrewd cyber criminals. These dangers, combined with a large portion of the South African population that has not had regular and sustained exposure to technology and broadband internet access, expose local communities to cyber threats. Research done by the Council for Scientific ...
متن کاملDatabase Security - Attacks and Control Methods
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the dat...
متن کاملCyber Security for Cyber Physcial Systems: a Trust-based Approach
CyberPhysical Systems (CPS) consist of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one of the key concepts to shield the CPS e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Internet Banking and Commerce
سال: 2015
ISSN: 1204-5357
DOI: 10.4172/1204-5357.1000115