1. bookTom 42 (2021): Zeszyt 4 (December 2021)
Informacje o czasopiśmie
License
Format
Czasopismo
eISSN
2353-8414
Pierwsze wydanie
30 Mar 2015
Częstotliwość wydawania
4 razy w roku
Języki
Angielski
Otwarty dostęp

Zero Identity — The New Cybersecurity Paradigm

Data publikacji: 02 Feb 2022
Tom & Zeszyt: Tom 42 (2021) - Zeszyt 4 (December 2021)
Zakres stron: 97 - 109
Informacje o czasopiśmie
License
Format
Czasopismo
eISSN
2353-8414
Pierwsze wydanie
30 Mar 2015
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

1. AP (June 2, 2021). Getting Back online After Cyberattack. https://www.cnbc.com/2021/06/02/jbs-worlds-largest-meat-producer-getting-back-online-after-cyberattack.html Search in Google Scholar

2. Cohen-Almagor (April 2011). Internet History. International Journal of Techno ethics. https://ieeexplore.ieee.org/abstract/document/5622061 Search in Google Scholar

3. Jang-Jaccard, J. and Nepal, S. (August 2014). A survey of emerging threats in cybersecurity. Journal of Computer and Systems Sciences, 80, 5, pp. 973–993. https://doi.org/10.1016/j.jcss.2014.02.00510.1016/j.jcss.2014.02.005 Search in Google Scholar

4. Krigman, A. (October 22, 2020). Cyber Autopsy Series: Ukraine Power Grid Attack Makes History. https://www.globalsign.com/en/blog/cyber-autopsy-series-ukranian-power-grid-attack-makes-history Search in Google Scholar

5. Morgan, S. (November 13, 2020). Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybersecurity Ventures. https://cybersecurityventures.com/cybercrime-will-cost-the-world-16-4-billion-a-day-in-2021 Search in Google Scholar

6. Nield, D. (December 10, 2015). Google’s Quantum Computer is 100 million Times Faster Than Your Laptop. Science Alert. https://www.sciencealert.com/google-s-quantum-computer-is-100-million-times-faster-than-your-laptop Search in Google Scholar

7. Norton (2020). Norton Cyber Security Insights Report: Global Results, Symantec. https://www.nortonlifelock.com/us/en/newsroom/press-kits/2021-norton-cyber-safety-insights-report/ Search in Google Scholar

8. Okereafor, K. and Adelaiye, O. (July 2020). Randomized Cyber Attacks Simulation Model: A Cyber Security Mitigation Proposal for Post Covid-19 Digital Era. International Journal of Recent Engineering Research and Development, 5, 7, pp. 61–72. Search in Google Scholar

9. Pagliery, J. (August 5, 2015). The Inside Story of the Biggest Hack in History. https://money.cnn.com/2015/08/05/technology/aramco-hack/index.html Search in Google Scholar

10. Perlroth, N. (June 6, 2021). Are We Waiting for Everyone to Get Hacked? New York Times. Search in Google Scholar

11. Riley, T. (December 7, 2020). Cybersecurity 202: Global Losses from Cybercrime Skyrocketed to nearly $1 Trillion in 2020. The Washington Post. Search in Google Scholar

12. Stewart, T. and Strausbaugh, S. (September 26, 2017). The 8 Character Password is Dead. Protiviti, https://tcblog.protiviti.com/2017/09/26/the-8-character-password-is-dead Search in Google Scholar

13. Turton, W. and Mehrotra, K. (June 4, 2021). Hackers Breach Colonial Pipeline Using Compromised Password. Bloomberg, https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password Search in Google Scholar

14. So, H.K., Kwok, S.H.M., Lam, E.Y., and Lui, K. (2010). Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid. 2010 First IEEE International Conference on Smart Grid Communications, pp. 321–326. Doi: 10.1109/SMARTGRID.2010.5622061.10.1109/SMARTGRID.2010.5622061 Search in Google Scholar

15. Vailshery, L. (January 22, 2021). Average Number of Devices in the Typical American Home. Statista, https://www.statista.com/statistics/1107206/average-number-of-connected-devices-us-house Search in Google Scholar

Polecane artykuły z Trend MD

Zaplanuj zdalną konferencję ze Sciendo