INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] R. Sobers: 110 Must-Know Cybersecurity Statistics for 2020, Inside Out Security Blog, 2020, Available at: https://www.varonis.com/blog/cybersecurity-statistics/ Search in Google Scholar

[2] S. Baraković, et al.: Security Issues in Wireless Networks: An Overview, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775732 Search in Google Scholar

[3] C. Crane: The Top Cyber Security Trends in 2019 (and What to Expect in 2020), 2019, Available at: https://www.thesslstore.com/blog/the-top-cyber-security-trends-in-2019-and-what-to-expect-in-2020/ Search in Google Scholar

[4] Verzion: Data Breach Investigations Report, 201910.1016/S1361-3723(19)30060-0 Search in Google Scholar

[5] RSA: 2019 Current State of Cybercrime - The Digital Transformation of Cybercrime, 2019, Available at: https://www.rsa.com/content/dam/en/white-paper/2019-current-state-of-cybercrime.pdf Search in Google Scholar

[6] Malwarebytes LABS: Cybercrime tactics and techniques Q1 2019, 2019, Available at: https://resources.malwarebytes.com/files/2019/04/MWB-CTNT-2019-state-of-malware_FINAL.pdf10.1016/S1361-3723(19)30049-1 Search in Google Scholar

[7] Ponemon Institute: Staffing the IT Security Function in the Age of Automation: A Study of Organizations in the United States, United Kingdom and APAC, 2019, Available at: https://www.domaintools.com/content/2019-ponemon-report-staffing-it-age-automation.pdf Search in Google Scholar

[8] IDC: Worldwide Spending on Security Solutions Forecast to Reach $103.1 Billion in 2019, According to a New IDC Spending Guide, 2019, Available at: https://www.idc.com/getdoc.jsp?container-Id=prUS44935119 Search in Google Scholar

[9] NetAcad: CCNA Security, 2019 Search in Google Scholar

[10] S. Baraković, J. Baraković Husić: Short and Sweet: Cloud Computing and Its Security, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775725 Search in Google Scholar

[11] OWASP: Top 10 Web Application Security Risks, 2019, Available at: https://owasp.org/www-project-top-ten/ Search in Google Scholar

[12] K. D. Mitnick, W. L. Simon. The Art of Deception: Controlling the Human Element of Security. Wiley, 1st edition, 2003 Search in Google Scholar

[13] M. Curphey, J. Scambray, E. Olson: Improving Web Application Security, Threats and Countermeasures, 2003 Search in Google Scholar

[14] N. Shevchenko, T. A. Chick, P. O’Riordan, T. Scan-lon, C. Woody: Threat modeling: A summary of available methods, 2018, Available: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=524448 Search in Google Scholar

[15] A. Shostack: Threat Modeling: Designing for Security. John Wiley & Sons, Inc., 2014 Search in Google Scholar

[16] M. Haider: Application Threat Modelling using DREAD and STRIDE, Infosec Blog, 2017, Available at: https://haiderm.com/application-threat-modeling-using-dread-and-stride/ Search in Google Scholar

[17] R. Shahan: Azure Internet of Things: Internet of Things (IoT) security architecture, Microsoft Azure, 2018, Available at: https://docs.microsoft.com/enus/azure/iot-fundamentals/iot-security-architecture. Search in Google Scholar

[18] M. Kovatsch, R. Matsukura, M. Lagally, T. Kawaguchi, K. Toumura, K. Kajimoto: WoT architecture, W3C, 2020, Available at: https://www.w3.org/TR/wot-architecture/ Search in Google Scholar

[19] Microsoft Corporation: Threat Modeling: Microsoft Threat Modeling Tool, 2020, Available at: https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling Search in Google Scholar

eISSN:
2566-3151
Lingua:
Inglese