Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
|Authors||Bendovschi, Andreea and Al-Nemrat, A.|
Companies and individuals are becoming more dependant on technology, automated processes, the Internet of Things (IoT) and daily use of internet, mobile devices, and other tools that the technological revolution has created. But against the back-drop of rapid technological progress, cyber-threats have become a serious challenge that require immediate, continuous action. As cyber-crime poses an ever-present and growing threat, corporate and individual users of the cyber-space are constantly struggling to ensure an acceptable level of security with respect to their assets. Based on an analysis of 4,785 attacks deployed world-wide in recent years, this paper outlines the correlations and patterns identified, with the final objective of defining security countermeasures that organisations from certain business sectors could implement in order to focus their limited resources and budget on mitigating the right risks.
|Keywords||logistic regression; security; controls; cyber-attacks; data analysis|
|Book title||2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)|
|17 Nov 2016|
|Publication process dates|
|Deposited||01 Mar 2017|
|Event||4th International Conference on Cybercrime and Computer Forensics (ICCCF) – Technically Co-Sponsored by IEEE|
|Digital Object Identifier (DOI)||https://doi.org/10.1109/ICCCF.2016.7740440|
|Web address (URL)||http://doi.org/10.1109/ICCCF.2016.7740440|
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
|Accepted author manuscript|
6views this month
8downloads this month