Showing 61 - 70 of 50,938
Persistent link: https://www.econbiz.de/10002798640
In recent years, many lawsuits have been filed by individuals seeking legal redress for harms caused by the loss or theft of their personal information. However, very little is known about the drivers, mechanics, and outcomes of those lawsuits, making it difficult to assess the effectiveness of...
Persistent link: https://www.econbiz.de/10014174056
Cyber space is being used as a chosen platform for conveying the messages of terrorism since the inception of easy communication methods through various cyber pockets. In India, cyber space had been used in the recent major terror attacks in 2009 and 8. The striking factor here is, the Indian...
Persistent link: https://www.econbiz.de/10014175390
In the past few decades, cyber attacks have evolved from boastful hacking to sophisticated cyber assaults that are integrated into the modern military machine. As the tools of cyber attacks become more accessible and dangerous, it’s necessary for state and non-state cyber attackers to...
Persistent link: https://www.econbiz.de/10014176888
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-existing weaknesses in the underlying technology. Because these vulnerabilities that exist in the network are not themselves illegal, they tend to be overlooked in the debate on cyber security. A UK...
Persistent link: https://www.econbiz.de/10014180921
Over the past two years there has been a steady drumbeat of alarmist rhetoric coming out of Washington about potential catastrophic cyber threats. For example, at a Senate Armed Services Committee hearing last year, Chairman Carl Levin said that “cyberweapons and cyberattacks potentially can...
Persistent link: https://www.econbiz.de/10014182602
A stronger legal and regulatory environment, high profile privacy failures, and increasing public concerns build the case for enterprises to take privacy seriously. For those new to the subject, this paper describes the harms that privacy failures can lead to, and the reasons why privacy issues...
Persistent link: https://www.econbiz.de/10014185839
Hackers have been online since a Cornell graduate student infected MIT’s burgeoning network with the first Internet worm on November 2, 1988. But recently cyber attacks on states have proliferated both in numbers and severity. The best-known recent example of such a cyber attack was on April...
Persistent link: https://www.econbiz.de/10014046013
The electric industry is experiencing notable changes with the implementation of communication and automation technology, many of which are part of the smart grid movement. Similar to other critical infrastructure industries such as banking, transportation and the cross sector critical...
Persistent link: https://www.econbiz.de/10014194402
The paper deals with cyber defense architecture and its possible implementation for a campus-wide network. It gives an extensive case study to secure the critical online information from internal and external malicious attacks. Under this case study, different security measures and their usage...
Persistent link: https://www.econbiz.de/10014194747