期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Cyberattack Ramifications, The Hidden Cost of a Security Breach
1
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
2
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) cyberwarfare
下载PDF
Complexity Science and Cyber Operations: A Literature Survey 被引量:1
3
作者 Briant Becote Bhaskar Prasad Rimal 《Complex System Modeling and Simulation》 EI 2023年第4期327-342,共16页
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic entities consisting of characteristics beyond the sum of a system’s individual elements.This paper presents current resear... Complexity science is an interdisciplinary scientific field that analyzes systems as holistic entities consisting of characteristics beyond the sum of a system’s individual elements.This paper presents current research across the literature promoting cyber security as a complex adaptive system.We introduce complex systems concepts and fields of study,and deliver historical context,main themes,and current research relevant to cyber operations.Examples of cyber operations research leveraging agent-based modeling demonstrate the power of computational modeling grounded in complex systems principles.We discuss cyber operations as a scientific field,define current shortfalls for scientific rigor,and provide examples of how a complexity science foundation can further research and practice across a variety of cyber-based efforts.We propose standard definitions applicable to complex systems for cyber professionals and conclude with recommendations for future cyber operations research. 展开更多
关键词 CYBERSECURITY cyberwarfare MODELING SIMULATION agent-based modeling(ABM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部