نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

2015
RANJAN PAL LEANA GOLUBCHIK KONSTANTINOS PSOUNIS

Recent work in security has illustrated that solutions aimed at detection and elimination of security threats alone are unlikely to result in a robust cyberspace. As an orthogonal approach to mitigating security problems, some have pursued the use of cyber-insurance as a suitable risk management technique. Such an approach has the potential to jointly align the incentives of security vendors (e...

Journal: :ACM SIGMETRICS Performance Evaluation Review 2019

2017
Rui Zhang Quanyan Zhu

Cyber insurance is a valuable approach to mitigate further the cyber risk and its loss in addition to the deployment of technological cyber defense solutions such as intrusion detection systems and firewalls. An effective cyber insurance policy can reduce the number of successful cyber attacks by incentivizing the adoption of preventative measures and the implementation of best practices of the...

2015
Jürgen Großmann Fredrik Seehusen

Managing cyber security has become increasingly important due to the growing interconnectivity of computerized systems and their use in society. A comprehensive assessment of cyber security can be challenging as its spans across different domains of knowledge and expertise. For instance, identifying cyber security vulnerabilities requires detailed technical expertise and knowledge, while the as...

2015
Xuan Liu Xingdong Liu Zuyi Li

The increasing use of information technologies in power systems has increased the risk of power systems to cyber-attacks. In this paper, we assess the risk of transmission lines being overloaded due to cyber-based false data injection attacks. The cyber risk assessment is formulated as bilevel optimization problems that determine the maximum line flows under false data injection attacks. We pro...

Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating  role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...

2015
Janine S. Hiller Roberta S. Russell

Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory’s industrial controls, and the Ukrainian go...

2015
Surender Kumar M K Soni D K Jain

Cyber security has become a critical priority for electric utilities. With the increase in the use of intelligent measuring devices like PMUs and more advanced communications and information technology in smart grid, the overall attack surface has increased. Cyber attacks against synchrophasor system critical infrastructure are detrimental to the functioning of the society as a whole. This pape...

2016
William Bradley Glisson Kim-Kwang Raymond Choo

The continuous amalgamation of technology into the ever increasing facets of everyday life are conducive to encouraging cyber-crimes and cybersecurity evolution and diversification. Hence, responses that address resulting concerns presented in this mini-track include ‘A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams’, ‘A ThreatVulnerability Bas...

Journal: :Journal of business continuity & emergency planning 2013
Danny Vande Putte Marc Verhelst

Risk management has never been easy. Finding efficient mitigating measures is not always straightforward. Finding measures for cyber crime, however, is a really huge challenge because cyber threats are changing all the time. As the sophistication of these threats is growing, their impact increases. Moreover, society and its economy have become increasingly dependent on information and communica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید