Currently, society is going through a health event with devastating results. In their desire to control the 2019 coronavirus disease, large organizations have turned over the execution of their activities to the use of information technology. These tools, adapted to the use of the Internet, have been presented as an effective solution to the measures implemented by the majority of nations where quarantines are generalized. However, the solution given by information technologies has several disadvantages that must be solved. The most important in this regard is with the serious security incidents that exist, where many organizations have been compromised and their data has been exposed. As a solution, this work proposes the design of a guide...
As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwi...
D.Phil.(Computer Science)In this thesis we will investigate the development of Critical Information ...
As nations recognize that their critical infrastructures have integrated sophisticated information a...
Information Security is an important aspect of decision making in organisations today. Organisations...
All authorized users have an interest in the security of the computer resources at Georgia Southern ...
The purpose of this paper is to describe an approach to enhance the security in a research organizat...
Computer security incident response teams (CSIRTs) respond to a computer security incident when the ...
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace. It shou...
The incident response security playbook\u27s objective is to offer all employees an organization wit...
Computer security incident response teams (CSIRTs) respond to a computer security incident when the ...
This paper summarises the results of a Dutch PhD research project on IT security vulnerability and i...
This study was conducted to determine the extent of management of computer security threats of the D...
Continually the number of transactions carried out electronically via the internet has grown, as wel...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
eHealth organizations are a major target for hackers as they hold wealth of information. Current cyb...
As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwi...
D.Phil.(Computer Science)In this thesis we will investigate the development of Critical Information ...
As nations recognize that their critical infrastructures have integrated sophisticated information a...
Information Security is an important aspect of decision making in organisations today. Organisations...
All authorized users have an interest in the security of the computer resources at Georgia Southern ...
The purpose of this paper is to describe an approach to enhance the security in a research organizat...
Computer security incident response teams (CSIRTs) respond to a computer security incident when the ...
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace. It shou...
The incident response security playbook\u27s objective is to offer all employees an organization wit...
Computer security incident response teams (CSIRTs) respond to a computer security incident when the ...
This paper summarises the results of a Dutch PhD research project on IT security vulnerability and i...
This study was conducted to determine the extent of management of computer security threats of the D...
Continually the number of transactions carried out electronically via the internet has grown, as wel...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
eHealth organizations are a major target for hackers as they hold wealth of information. Current cyb...
As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwi...
D.Phil.(Computer Science)In this thesis we will investigate the development of Critical Information ...
As nations recognize that their critical infrastructures have integrated sophisticated information a...