Information Sharing for Cyber Threats

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preparing for Cyber Threats with Information Security Policies

Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The sce...

متن کامل

Investigating Cyber Security Threats:

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

متن کامل

Cyber threats to health information systems: A systematic review.

BACKGROUND Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. OBJECTIVE The rationale behind this systematic review is to provide a framework for future research by identifyi...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Information Management and Sharing for National Cyber Situational Awareness

ICT has been integrated massively in business processes in recent years, thus producing an enormous dependency on these technologies. The potential impact of these dependencies (for example if the IT systems are lacking appropriate security levels) are remarkable – the malfunction or total loss of public energy grids, the banking system, supply chains or public administration can cause enormous...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information & Security: An International Journal

سال: 2018

ISSN: 0861-5160,1314-2119

DOI: 10.11610/isij.3904