نتایج جستجو برای: سایبرلوفینگ cyber loafing
تعداد نتایج: 16469 فیلتر نتایج به سال:
Background: The Cyber Preparedness Continuum CNA’s Safety and Security Division conducted a Cyber Preparedness Workshop on April 25, 2013, at CNA’s headquarters in Alexandria, Virginia. The workshop brought together emergency management and cybersecurity stakeholders, drawn from both the public and private sectors, to discuss cyber preparedness. Discussions during the workshop centered around t...
This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flow...
Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on organizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder...
1.0 Abstract As a form of collaborative learning, allowing students to engage in teamwork has been attributed to the retention of information, motivation, critical reasoning, communication and social skills among others (Hansen 2006). However, is the use of teamwork always the right technique? The benefits outlined are dependent on the success of the teamwork initiative which is not guaranteed ...
Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cy...
In the current era of online processing, maximum of the information is online and prone to cyber threats. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber attacks. Cyber attacks may have some motivation behind it or may be processed unknowingly. The attacks those are processed knowingly c...
یکی از مسائل چالشبرانگیز حقوق بینالملل در ادوار مختلف، تنظیم روابط دولتهای متخاصم و شیوه حل و فصل اختلافات آنها با یکدیگر بوده است. در این میان، تا مدت های مدید، اصلیترین راه حل اختلاف، جنگ و توسل به زور بود؛ هرچند به مرور نهادینه کردن حقوقیِ این امرِ مذموم با هدف کاهش و سپس حذف آن، وجهه همت جامعه بینالمللی قرار گرفت. از زمانی که اسناد بینالمللی، جنگ و حمله نظامی را به طور مطلق ممنوع کردن...
Today’s students have grown up with computer-based technology and need to be prepared to enter a career in a digital world. This includes an understanding of the broader implications of technology such as the growing threat of cyber-crime and cyber-terrorism, cyber-ethics, the legal and social implications of technology, and the local and global impacts. At our institution, we have taken a broa...
The cyber threat landscape has evolved in fairly dramatic ways. Cyber threats come in various different forms both technical and content related threats. Emerging threats have become sophisticated and a lot more disastrous involving state actors, state-sponsored actors, international organized criminals and Internet hacker activist groups. Today‘s cyber threats pose challenges to the Government...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید