Showing 1 - 10 of 27
Vom ursprünglichen „Phishing = Passwort + Fishing“ wandelt sich das Angriffsmuster durch neue Technologien zum boomenden Geschäftsmodell der cyberkriminellen Szene. Schadsoftware wie „Emotet“ zeigt, dass automatisierte Spear Phishing-Angriffe Realität geworden sind und immense...
Persistent link: https://www.econbiz.de/10014503511
System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response … practice—the lack of sufficient context in actionable security information disseminated to constituent organizations. ST-SIEM … unknown) with predefined social security metrics (used for modeling the security culture of constituent organizations). ST-SIEM …
Persistent link: https://www.econbiz.de/10012048011
Persistent link: https://www.econbiz.de/10002286165
management (SIEM) systems use these tools in combination to collect events from diverse data sources across the network. SIEM is … a proactive tool that processes the events to present a unified security view of the whole network at one location. SIEM … options available, the selection of a suitable and cost-effective open source SIEM solution that can effectively meet most of …
Persistent link: https://www.econbiz.de/10014754842
This study tested the context of employees using their devices for both work and personal use, and non-compliant device usage of a person potentially resulting in Information Systems (IS) security threat to personal as well as work data and/or the devices. Integrating bystander and protection...
Persistent link: https://www.econbiz.de/10012045764
Mobile devices have become a ubiquitous technology that are also inherently intertwined with modern society. They have enabled a revolution of how people engage and interact with technology, computing and the Internet. However, as their popularity has increased, so have the threats against them....
Persistent link: https://www.econbiz.de/10012046449
As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat...
Persistent link: https://www.econbiz.de/10012046604
Kleine und mittlere Unternehmen aller Branchen versuchen sich nach wie vor angemessen mit den Herausforderungen der Globalisierung und der digitalen Transformation auseinanderzusetzen. Sie bilden in diesem Zusammenhang wachsende Kompetenz in der Produktionsautomatisierung (Industrie 4.0) und in...
Persistent link: https://www.econbiz.de/10014503561
Persistent link: https://www.econbiz.de/10011566557
Persistent link: https://www.econbiz.de/10010478642