Showing 91 - 100 of 3,305
This article describes how in recent years, Iran has joined the top ranks of the world powers in cyberspace and has demonstrated the ability to leverage cyberwarfare as a significant tool in its arsenal for pursuing its national security goals. While this increase in cyber power is relatively...
Persistent link: https://www.econbiz.de/10012043902
cybersecurity engineering problem associated with Internet traffic is addressed. The synthetic Lévy-walks process is intertwined …
Persistent link: https://www.econbiz.de/10012045165
There is a colossal cyber security workforce shortage. Global estimates state there are over 1 million unfilled cyber security jobs. As everyone becomes increasingly hyper-connected and cybercrime intensifies in both scale and complexity, the need for experts in the field is dire. Innovative...
Persistent link: https://www.econbiz.de/10012045246
Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity … professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity … operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and number of cyber …
Persistent link: https://www.econbiz.de/10012045247
therefore, sets out to examine the ethical implications of cybersecurity phenomenon. Relying upon an extensive contemporary … qualitative analysis of the current cybersecurity landscape in Nigeria. With an insight provided into understanding the …
Persistent link: https://www.econbiz.de/10012045390
This article focuses on factors that comprise effective risk communication, decision-making, and measurement of information technology (IT)/ information assurance (IA) risk. A review of the extant literature provided the basis for the formulation of research questions. The sample population...
Persistent link: https://www.econbiz.de/10012047907
The history of modern standards development provides support for the argument that the process of standardization has evolved in response to crises and opportunities. In the information and communication technologies (ICT) sector, many new groups have become involved in standards setting. In a...
Persistent link: https://www.econbiz.de/10012047979
transform is used to address a cybersecurity problem associated with the Internet-of-things (IoT). The synthetic Lévy-walk is …
Persistent link: https://www.econbiz.de/10012048031
Big Data refers to data volumes in the range of exabytes (1018th) requiring processing from distributed on-line storage systems with thousands of processors, mainframes or supercomputers where processing speed is measured in GFLOPS. The rate at which data are being collected are accelerating and...
Persistent link: https://www.econbiz.de/10012048173
strategies do or do not work?” Discussions related to the current environment, hiring and retaining qualified employees, defining …
Persistent link: https://www.econbiz.de/10012048200