نتایج جستجو برای: cyber risk
تعداد نتایج: 957999 فیلتر نتایج به سال:
Patterns of engagement in cyber bullying and four types of traditional bullying were examined using latent class analysis (LCA). Demographic differences and externalizing problems were evaluated across latent class membership. Data were obtained from the 2005-2006 Health Behavior in School-aged Survey and the analytic sample included 7,508 U.S. adolescents in grades 6 through 10. LCA models wer...
The transformation of industrial assets into networked entities promises to increase the productivity of manufacturing processes significantly. It is a prerequisite for the close integration of these assets into production environments that increasingly rely on computerized planning, execution, and monitoring systems. The result of combining a (mechanical) asset with extensive computational cap...
Smart grids will make extensive use of information and communication technology (ICT) to enable the integration of renewable energy sources. Consequently, future power grids come with a much larger cyber-attack surface, which makes cybersecurity risk assessment a major concern. Due to their cyber-physical nature, risk assessment in smart grids is a challenging task. Moreover, the complex mix of...
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, according to security experts, such software (an...
چکیده رشد فزاینده تکنولوژی در حوزه اطلاعات و ارتباطات، تهدیدهایی نیز به دنبال داشته است که حمله سایبری نمونه بارز چنین تهدیدی محسوب میگردد. تبعات چنین حملاتی به حدی جدی است که بازیگران بین المللی به ویژه دولتها را جهت اتخاذ رویه های مناسب و مواضع سیاسی-حقوقی به تکاپو واداشته است. مهم ترین چالش فراروی این موضوع مسئله مفهوم شناسی و تعریف حمله سایبری و لزوم تبیین و تعیین دایره مفهومی این پدیده است...
The ability to network machinery and devices that are otherwise isolated is highly attractive to industry. This has led to growth in the use of cyber-physical systems (CPSs) with existing infrastructure. However, coupling physical and cyber processes leaves CPSs vulnerable to security attacks. A threat-vulnerability based risk model is developed through a detailed analysis of CPS security attac...
The COVID-19 pandemic and now the war in Ukraine, have raised risks to levels not seen last 30 years [...]
Cyber Threat Information (CTI) has emerged to help cybersecurity professionals keep abreast of and respond rising cyber threats (CT) in real-time. This paper aims study the impact threat intelligence on risk management Saudi universities mitigating risks. In this survey, a comprehensive review CTI concepts challenges, as well practices higher education, is presented. Previous literature was rev...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید