[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

Incorporating psychology into cyber security education: a pedagogical approach

J Taylor-Jackson, J McAlaney, JL Foster… - … Cryptography and Data …, 2020 - Springer
The role of the human in cyber security is well acknowledged. Many cyber security incidents
rely upon targets performing specific behavioural actions, such as opening a link within a …

Ethical implications for teaching students to hack to combat cybercrime and money laundering

T Na - Journal of Money Laundering Control, 2023 - emerald.com
Purpose Malicious hackers are increasingly evolving with technology by developing
advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or …

Cyber threats, attack strategy, and ethical hacking in telecommunications systems

EM Onyema, AE Dinar, S Ghouali, B Merabet… - Security and privacy in …, 2022 - Springer
There are rising cybersecurity concerns in the telecommunication sector as hackers intensify
their sophistication. The techniques employed by hackers are constantly evolving and so are …

[图书][B] Citizens and their political institutions in a digital context

E Dubois, F Martin-Bariteau - 2020 - elgaronline.com
Political systems are unavoidably digital. From digital government service delivery, to online
mobilization for protests in the streets, to disinformation spread across social media and …

Cyber defensive capacity and capability:: A perspective from the financial sector of a small state

K de Nobrega - 2023 - research.tilburguniversity.edu
Tilburg University Cyber defensive capacity and capability: de Nobrega, Kristel Page 1 Tilburg
University Cyber defensive capacity and capability: de Nobrega, Kristel DOI …

The value of criminological theories in explaining cybersecurity in south african smart cities

FP Cornelius, SKJ van Rensburg… - International Annals of …, 2022 - cambridge.org
The development of smart cities in South Africa has the potential to enrich quality of life,
encourage economic growth and reduce the human ecological footprint. It can advance and …

Penetration assessment and ways to combat attack on Android devices through StormBreaker-a social engineering tool

E Blancaflor, HKS Billo, BYP Saunar… - … on Information and …, 2023 - ieeexplore.ieee.org
With the continuous advancement of technology, it became necessary to use the internet to
communicate and exchange information. Since the internet is a known open platform …