دانلود و نمایش مقالات مرتبط با Cyberthreat::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Cyberthreat

تعداد مقالات یافته شده: 3
ردیف عنوان نوع
1 The regulatory framework for the protection of critical infrastructures against cyberthreats: Identifying shortcomings and addressing future challenges: The case of the health sector in particular
چارچوب نظارتی برای حفاظت از زیرساخت‌های حیاتی در برابر تهدیدات سایبری: شناسایی کاستی‌ها و رسیدگی به چالش‌های آینده: مورد بخش سلامت ویژه-2020
The concept of “Critical Infrastructures” is constantly evolving in order to reflect current concerns and to respond to new challenges, es- pecially in terms of (cyber)security and resilience. Protection of critical infrastructures against numerous threats has therefore developed into a high priority at national and EU level. During the last two decades a new type of threat has prevailed in the Critical Infrastructure threat landscape, that of cyberattacks; Protection against them is the primary focus of this paper. In order to do so the analysis first aims to drop some light into the differences between Critical Infrastructures and Critical Information Infrastructures, terms that are often confused, and to indicate possible inadequacies in the applicable protection regulatory regime. Finally, the health sector has been chosen as a sector-specific case in an effort to demonstrate how protection of a Critical Infrastructure, challenged as it has been with a constantly increasing number of cyber incidents, could be sufficiently protected in the new digitalised era.© 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)
مقاله انگلیسی
2 Port cybersecurity and threat: A structural model for prevention andpolicy development
امنیت سایبری و تهدید بندر: الگوی ساختاری برای پیشگیری و تدوین سیاست ها-2020
Most port operators have increasingly integrated cybertechnology into port activities to increase theircompetitiveness; unfortunately, this digitalization becomes the major vulnerability for the emergingcyberthreat. To help port policymakers develop cybersecurity measures, this study conceptualized anddeveloped three dimensions of port cybersecurity hygiene (i.e. human, infrastructure, and procedurefactors) and investigated the relationships between port cybersecurity hygiene and cyberthreats (i.e.hacktivism, cyber criminality, cyber espionage, cyber terrorism, and cyber war). A questionnaire surveywas used to collect data from all international container port operators and shipping lines with branchesin Thailand, and the proposed relationships were tested by structural equation modeling. The resultsindicated that container ports tended to encounter hacktivism when their human, infrastructure, andprocedure factors were vulnerable. The weakness of the human factor could also lead to cyber terrorism,while the deficiency of the infrastructure factor could lead to cyber criminality. Moreover, containerports were likely to be harmed by cyber espionage if their procedure factor was poorly implemented.Hence, the provision of training and education to all port workers, including top executives, managers,and supervisors, are necessary to ensure a cyberthreat-awareness culture at all organizational levels.Improving cybersecurity equipment could prevent unauthorized access to port business data and keepimportant information secure, while the ISPS Code-based procedures and other preventive measuresshould be strictly implemented by container ports to reduce the risk of cyberthreats.
Keywords: Cyberthreat | Port cybersecurity hygiene | Cybertechnology | Prevention and policy development | Port digitalization | Structural equation modeling
مقاله انگلیسی
3 Building a robust cyber threat profile for institutions of higher education: An empirical analysis of external cyberattacks against a large Universitys computer network
ایجاد یک نمایه تهدید سایبری قوی برای مؤسسات آموزش عالی: یک تحلیل تجربی از حملات سایبری خارجی علیه شبکه کامپیوتری یک دانشگاه بزرگ-2020
This study investigated twelve categories of exploits targeting a large southern university to build a build a more robust cyberthreat profile for institutions of higher education. In one week, the university experienced 12.4 million external cyberattacks from 110 countries. Malware constituted 58% of all malicious activities. Attacks were statistically more likely to occur during the overnight hours of weekdays. Moreover, the majority of cyberattack activity was generated by a limited number of IP addresses originating from a handful of countries. Dutch-originating IP addresses were responsible for 71% of all cyberattacks in this study, and spyware attacks almost exclusively originated from a single IP address in the U.S.
Keywords: Cyberattacks | Cybersecurity | Universities | Malware | Routine activity theory
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6149 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40416 :::::::: افراد آنلاین: 46