نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

2007
Hemantha S. B. Herath Tejaswini Herath

In recent years there has been a growing stream of research focusing on cyber-insurance. Risk transference with insurance has been suggested by both practitioners and academics to absorb losses caused by security breaches as well as to supplement the existing set of security tools to manage IT security residual risk after IT security investments are made. In this paper, we investigate pricing o...

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

2016
Varun Dutt

In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. The current work describes a cognitive Instance-Based Learning (IBL) model of an analyst’s recognition and comprehension processes in a cyber-attack scenario. The IBL model first recognizes network events based upon events’ situation attributes and their similarity to past experiences (instance...

2013
Frédéric PETIT Benoît Robert

Critical Infrastructures (CIs) are complex systems. For their operations, these infrastructures are increasingly using Supervisory Control And Data Acquisition (SCADA) systems. Management practices are therefore highly dependent on the cyber tools, but also on the data needed to make these tools work. Therefore, CIs are greatly vulnerable to degradation of data. In this context, this paper aims...

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2009
Ginger Davis Alfredo Garcia Weide Zhang

We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies re...

2015
Chris Johnson

There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation, maritime, rail and power-generation infrastructures has created common, vulnerabilities. In consequence, more people now possess the technical skills r...

Mahdi Omrani, Masoud Shafiee, Siavash Khorsandi,

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

2016
Clemens Sauerwein

In the last couples of years, the complexity and interconnectedness of Information Systems (IS), and security related incidents increased significantly. In order to guarantee confidentiality, integrity, and availability of these IS an appropriate information security risk management (ISRM) must be in place. Reliable ISRM represents a challenge for organizations, since they take security related...

2014
Zahri Yunos Mohd Shamir Hashim Rahayu Ahmad

The potential for catastrophic cyber attacks that can cripple the operations of critical infrastructures of nations is worrying. The consequences of cyber attack to the Supervisory Control and Data Acquisition (SCADA) systems are wide, resulting in potentially catastrophic damages and disruption. This paper proposes for the Critical National Information Infrastructure (CNII) organizations to co...

Journal: :The Journal of school nursing : the official publication of the National Association of School Nurses 2017
Joris Van Ouytsel Elizabeth Torres Hye Jeong Choi Koen Ponnet Michel Walrave Jeff R Temple

Dating violence is an important public health concern and is considered to be a form of school violence. While digital technologies have enabled perpetrators of dating violence to target their victims online (cyber dating abuse), little is known about how this form of perpetration relates to specific adolescent risk behaviors. This brief research report focuses on the associations between subst...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید