Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations

M Qbea'h, J Alkaabi, S Almansouri… - … on Computer and …, 2023 - ieeexplore.ieee.org
These days, the scope of a huge number of web, desktop, IoT, cloud and mobile
applications being compromised is rapidly increasing. The attackers exploit weak …

Security Risk Analysis in Computer Networks for Small and Medium-Sized Enterprises

T Horák, P Střelec, S Kováč, J Šido, R Skýpala… - Computer Science On …, 2024 - Springer
Small-and medium-sized organizations, such as public administrations and other
institutions, are facing increasing demands for efficient information processing and storage …

Strategies for Proper Security Practices in Small Financial Institutions

A Leffell - 2023 - search.proquest.com
Financial institutions remain high targets for threat actors because of potentially lucrative
financial gains from security breaches. Information technology (IT) security professionals in …

[PDF][PDF] E-commerce and Information Security

T Larsson, N Engberg - 2021 - lup.lub.lu.se
At a time when e-commerce is thriving and companies have to work with large quantities of
data, there has been an increase of security risks. To stay current and afloat amidst and after …

[PDF][PDF] E-commerce and Information Security

N Engberg, T Larsson - lup.lub.lu.se
At a time when e-commerce is thriving and companies have to work with large quantities of
data, there has been an increase of security risks. To stay current and afloat amidst and after …