Information Security is booming. Companies are making money selling fear and countermeasures. The research community is also extremely active, churn-ing out papers featuring attacks on systems and their components. This includes attacks on traditional IT systems as well as on IT-enhanced systems, such as cars, implantable medical devices, voting systems, and smart meters, which are not primarily IT systems but have increasing amounts of IT inside. Moreover, any new paper on analysis methods for critical systems is now considered incom-plete without a collection of security-relevant scalps on its belt. Pretty much every system imaginable, critical or not, is now a target of attacks. There are good reasons for this trend. Fear sells! Headline...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
This issue of Business Information Review takes a focused look at Information Security, and the role...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
The current status of scholarly publishing has been the subject of numerous publications in recent...
Information security vulnerabilities and threats are alive and well today, but this is nothing new. ...
It is not uncommon to read about hacker attacks in the newspaper today. The hackers are targeting go...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Information technology (IT) is a global phenomenon that provides organizations of all types the abil...
A firm can build more effective security strategies by identifying and ranking the severity of poten...
With the rapid development of the enormous and frightening spread of information networks which turn...
Systems security is essential for the efficient operation of all organizations. Indeed, most large f...
Dramatic changes in the information security risk landscape over several decades have not yet been m...
this paper I have tried to expose the warning signs for these ecommerce entities from being a few no...
The proposed research integrates theories of demand-driven innovation and market value creation to e...
The use of the Internet has increased drastically the last few years. This trend has led to a consta...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
This issue of Business Information Review takes a focused look at Information Security, and the role...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
The current status of scholarly publishing has been the subject of numerous publications in recent...
Information security vulnerabilities and threats are alive and well today, but this is nothing new. ...
It is not uncommon to read about hacker attacks in the newspaper today. The hackers are targeting go...
Investments to protect against known vulnerabilities are necessary but not sufficient to assure a fi...
Information technology (IT) is a global phenomenon that provides organizations of all types the abil...
A firm can build more effective security strategies by identifying and ranking the severity of poten...
With the rapid development of the enormous and frightening spread of information networks which turn...
Systems security is essential for the efficient operation of all organizations. Indeed, most large f...
Dramatic changes in the information security risk landscape over several decades have not yet been m...
this paper I have tried to expose the warning signs for these ecommerce entities from being a few no...
The proposed research integrates theories of demand-driven innovation and market value creation to e...
The use of the Internet has increased drastically the last few years. This trend has led to a consta...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
This issue of Business Information Review takes a focused look at Information Security, and the role...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...