[HTML][HTML] The whole of cyber defense: Syncing practice and theory
KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …
cyber professionals face when defending their organization against cyberattacks. Using a …
[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
A survey on ethical hacking: issues and challenges
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …
is seriously high and can lead to dangerous consequences. However, in order to reduce the …
Incorporating psychology into cyber security education: a pedagogical approach
The role of the human in cyber security is well acknowledged. Many cyber security incidents
rely upon targets performing specific behavioural actions, such as opening a link within a …
rely upon targets performing specific behavioural actions, such as opening a link within a …
Ethical implications for teaching students to hack to combat cybercrime and money laundering
T Na - Journal of Money Laundering Control, 2023 - emerald.com
Purpose Malicious hackers are increasingly evolving with technology by developing
advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or …
advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or …
Cyber threats, attack strategy, and ethical hacking in telecommunications systems
There are rising cybersecurity concerns in the telecommunication sector as hackers intensify
their sophistication. The techniques employed by hackers are constantly evolving and so are …
their sophistication. The techniques employed by hackers are constantly evolving and so are …
[图书][B] Citizens and their political institutions in a digital context
E Dubois, F Martin-Bariteau - 2020 - elgaronline.com
Political systems are unavoidably digital. From digital government service delivery, to online
mobilization for protests in the streets, to disinformation spread across social media and …
mobilization for protests in the streets, to disinformation spread across social media and …
Cyber defensive capacity and capability:: A perspective from the financial sector of a small state
K de Nobrega - 2023 - research.tilburguniversity.edu
Tilburg University Cyber defensive capacity and capability: de Nobrega, Kristel Page 1 Tilburg
University Cyber defensive capacity and capability: de Nobrega, Kristel DOI …
University Cyber defensive capacity and capability: de Nobrega, Kristel DOI …
The value of criminological theories in explaining cybersecurity in south african smart cities
FP Cornelius, SKJ van Rensburg… - International Annals of …, 2022 - cambridge.org
The development of smart cities in South Africa has the potential to enrich quality of life,
encourage economic growth and reduce the human ecological footprint. It can advance and …
encourage economic growth and reduce the human ecological footprint. It can advance and …
Penetration assessment and ways to combat attack on Android devices through StormBreaker-a social engineering tool
E Blancaflor, HKS Billo, BYP Saunar… - … on Information and …, 2023 - ieeexplore.ieee.org
With the continuous advancement of technology, it became necessary to use the internet to
communicate and exchange information. Since the internet is a known open platform …
communicate and exchange information. Since the internet is a known open platform …