data security, and personal information protection. Since 2016, three important laws (hereinafter referred to as the “Three Basic Laws”), namely, (i) the Cybersecurity Law of the People's Republic of China/ 《中华人民共和国网络安全法》 (“Cybersecurity Law”), (ii) the Data Security Law...
Covid-19 bolstered international cybercrime, and compelled millions of unprepared organizations around the globe to urgently digitalize their business processes without requisite security and data protection. In this context, cybersecurity companies are, however, doing fairly well compared to many other ...
Stress levels are already high enough in resource-strapped public school districts without adding worry about data breaches. Stress can stem from not knowing how to address cyberthreats, where to start the process of securing your systems, feeling overwhelmed by the amount of information a...
Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts. Int. J. Crit. Infrastruct. Prot. 2021, 35, 100457. [Google Scholar] [CrossRef] Bertone, F.; Lubrano, F.; Goga, K. Artificial intelligence techniques to prevent cyber attacks on smart ...
This article identifies human factors in workplaces that contribute to the challenges faced by cybersecurity leadership within organizations and discusses strategic communication, human–computer interaction, organizational factors, social environments,
It focuses on five key domains: Information System Auditing Process, Governance and Management of IT, Information Systems Acquisition, Development and Implementation, Information Systems Operations and Business Resilience, and Protection of Information Assets. CISA equips professionals with the knowledge and ...
AbstractThe constantly increasing degree and frequency of cyber threats require the emergence of flexible and intelligent approaches to systems’ protection. Despite the calls for the use of artificial intelligence (AI) and machine learning (ML) in strengthening cyber security, there needs to be more...
(DSL) – in addition to the previous Cybersecurity Law enacted in 2017. Other department rules and standards are also being drafted, outlining different levels of risk for data, stipulating provisions for data collection and storage, and indicating the conditions and criteria for the transfer...
The percentage of incidents prevented due to proactive security measures, such as endpoint protection, intrusion detection systems, and threat intelligence. The number of false positives and false negatives generated by security monitoring tools and how these numbers are being reduced through continuous re...
Adaptive response is a widely adopted cyber resilience technique for the protection of the applications of the SG. It is considered as an active way of defense, since the system is modified in real time, and in such a way that the impact of the attack is mitigated. This process involves ...