[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
Internet of Things: Evolution and technologies from a security perspective
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …
[HTML][HTML] Security threats to critical infrastructure: the human factor
In the twenty-first century, globalisation made corporate boundaries invisible and difficult to
manage. This new macroeconomic transformation caused by globalisation introduced new …
manage. This new macroeconomic transformation caused by globalisation introduced new …
Cybersecurity Issues and Challenges for E-Government During COVID-19: A Review
IA Shah - Cybersecurity Measures for E-Government …, 2022 - igi-global.com
Cyber-attacks can steal information by applying different methods and activities of cyber
criminals, thereby destroying data, computer programs, and networking on one or more …
criminals, thereby destroying data, computer programs, and networking on one or more …
A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs
The growing amount of cyberspace threats highlights the need to evaluate cybersecurity
risks and to plan for effective investments. One internationally recognized document for …
risks and to plan for effective investments. One internationally recognized document for …
[HTML][HTML] Information security and cybersecurity management: A case study with SMEs in Portugal
Information security plays a key role in enterprises management, as it deals with the
confidentiality, privacy, integrity, and availability of one of their most valuable resources: data …
confidentiality, privacy, integrity, and availability of one of their most valuable resources: data …
[HTML][HTML] LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)
S Pawar, H Palivela - … Journal of Information Management Data Insights, 2022 - Elsevier
Abstract Globally Small and Medium Enterprises (SMEs) are the biggest contributors to the
economy by providing two-thirds of global employment opportunities and more than half the …
economy by providing two-thirds of global employment opportunities and more than half the …
IoT standardisation: Challenges, perspectives and solution
The success and widespread adoption of the Internet of Things (IoT) has increased many
folds over the last few years. Industries, technologists and home users recognise the …
folds over the last few years. Industries, technologists and home users recognise the …
It won't happen to me: surveying SME attitudes to cyber-security
M Wilson, S McDonald, D Button… - Journal of Computer …, 2023 - Taylor & Francis
We report an online survey of 85 UK-based SMEs that explored their threat and coping
appraisals toward five common types of cyber-attack: Network being hacked; Data being …
appraisals toward five common types of cyber-attack: Network being hacked; Data being …