Evaluating Database Security and Cyber Attacks: A Relational Approach

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SCADA Cyber Attacks and Security Vulnerabilities: Review

SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...

متن کامل

Developing a Complex Simulation Environment for Evaluating Cyber Attacks

The management of oil exploration is among the most important strategic tasks that a nation has. In Brazil, the Campos Basin is a petroleum rich area compassing oceanic fields that accounts for 80% of Brazil's oil production. Because the Campos Basin is offshore, there is a high volume of helicopter traffic in the area. Currently, the Department of Airspace Control, that manages the Brazilian A...

متن کامل

Evaluating Cyber Security Awareness in South Africa

In many ways, the internet and cyber world is a dangerous place where innocent users can inadvertently fall prey to shrewd cyber criminals. These dangers, combined with a large portion of the South African population that has not had regular and sustained exposure to technology and broadband internet access, expose local communities to cyber threats. Research done by the Council for Scientific ...

متن کامل

Database Security - Attacks and Control Methods

In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the dat...

متن کامل

Cyber Security for Cyber Physcial Systems: a Trust-based Approach

CyberPhysical Systems (CPS) consist of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one of the key concepts to shield the CPS e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Internet Banking and Commerce

سال: 2015

ISSN: 1204-5357

DOI: 10.4172/1204-5357.1000115