A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Opportunities and Challenges in Tracing Security Breaches
[chapter]
2003
IFIP Advances in Information and Communication Technology
The closing session of the working conference was a panel discussion on challenges and recent developments in tracing security breaches of information systems that manage mission critical data. ...
The panel members were (in alphabetical order): ...
The role of security and the aspect of tracing security breaches in particular were illustrated by Cristina Buchholz in the context of a Web services infrastructure employed by SAP. ...
doi:10.1007/978-0-387-35693-8_15
fatcat:twoqbjmiffbylbuk5p2njz2pkm
Health Data Privacy: Research Fronts, Hot Topics and Future Directions
[chapter]
2020
Studies in Health Technology and Informatics
Finally, we chart directions for future research on health data privacy, highlighting emerging topics, and boundary-breaking alternatives (e.g., GDPR, contact tracing apps in the context of pandemics). ...
We conducted a literature search between 2010 and 2020 in the Web of Science (WoS) database, resulted in 1,752 records. ...
., GDPR and privacy in the context of contact tracing apps in pandemics. Theses research opportunities are worth exploring to inform research, policy, and data protection practices. ...
doi:10.3233/shti200716
pmid:33227762
fatcat:ff2yqqy2kvfcthzrswhuqfjcxq
Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities
[chapter]
2021
Cybersecurity Threats with New Perspectives
However, this transition has also result in the emergence of cybercrimes and security breach incidents that threatens the privacy and security of the users. ...
However, the research has also observed specific threats to digital forensics, which include technical, operational and personnel-related challenges. ...
Such traces can assist forensic investigators in identifying Digital Forensics in Cyber Security-Recent Trends, Threats, and Opportunities DOI: http://dx.doi.org/10.5772/intechopen.94452 various file-related ...
doi:10.5772/intechopen.94452
fatcat:dg6xxu5tyfawhjomggmyi3znzq
The Second Round of Information Security Challenges at TJX Companies
2021
Zenodo
Based on UpGuard's third-party report, it was discovered that despite the purported recovery from a 2007 TJX data breach debacle and supposed enhancements in its digital infrastructure, there are still ...
over $40B in sales and a market value of over $62B. ...
Carol Meyrowitz was CEO of TJX during its most challenging time in 2007 when the globally dominant off-price discount chain was rocked by a humongous credit card security breach crisis (Davidson 2009 ...
doi:10.5281/zenodo.4639611
fatcat:cat2yo3pf5d5ddf57jo2tuegua
A Security Management Framework for Telecommunications in Africa
2022
Journal of Internet Technology and Secured Transaction
In this paper we identify the security challenges associated with Internet based services especially in the telecommunications domain. ...
With a focus on the African telecommunications environment and the associated technological challenges, an analysis of the Strength, Weaknesses, Opportunities and Threats (SWOT) is presented with a viewing ...
The Impact of Security Breaches Security breaches often result in losses in the ICT equipment and pertinent data which comes with a huge economic cost, in terms of loss of revenue in replacing expensive ...
doi:10.20533/jitst.2046.3723.2022.0093
fatcat:hjqznlwk5bfqzai4h6gpupscfe
What engineers should know about US security and privacy law
2013
IEEE Security and Privacy
In this article, we examine how emerging US security and privacy laws create new requirements that constrain software development, affecting business owners and developers who want to design security and ...
A s new technology challenges our assumptions about security and privacy, lawmakers respond by attempting to curb and avoid the most egregious risks to the public. ...
What Engineers Should Know about US Security and Privacy Law Travis Breaux and David Gordon | Carnegie Mellon University A s new technology challenges our assumptions about security and privacy, lawmakers ...
doi:10.1109/msp.2013.74
fatcat:uwqzb57hmzae7lygc3inmthhce
Enterprise data breach: causes, challenges, prevention, and future directions
2017
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery
solutions and exciting opportunities. ...
As the volume of data is growing exponentially and data breaches are happening more frequently than ever before, detecting and preventing data loss has become one of the most pressing security concerns ...
The volume, variety, and velocity of big data bring both opportunities and challenges for nearly real-time identifying data leak threats. ...
doi:10.1002/widm.1211
fatcat:reuwnplyezenfpkjniywn62dey
The Quest for Data Transparency
2020
IEEE Security and Privacy
Data transparency is the ability of subjects to effectively gain access to all information related to data used in processes and decisions that affect the subjects." www.computer.org/security Elisa Bertino ...
Contact her at bertino@purdue.edu. continued from p. 68 Last Word Often individuals are not aware of the digital traces they leave around that are collected by a variety of parties. ...
In such case, subjects for whom data transparency is critical are individuals that within organizations are responsible for compliance and data security and privacy. ...
doi:10.1109/msec.2020.2980593
fatcat:f2u4kj5tdfgwvi5arti57qw3zy
Security or Breach – Enterprise to Decide
2018
International Journal of Engineering Research and
Enterprise Security Challenges have been an ongoing discussion in the professional world at the CIO/ CISO level, but the most important question is how and what we are doing about it? ...
Are we well informed and prepared in fighting the APT's? How effective our security layer is to identify an attack sooner than later? ...
Any security breach doesn't only affect the data or data points but the entire organization reputation and inflict lasting brand damage, resulting loss in business opportunities. ...
doi:10.17577/ijertv7is040428
fatcat:b3xqyuwiwrdi7llsssqmyplb4a
A New Order in Cyberspace Awaits us
2020
Journal of Law and Administration
However, if one keeps in mind the broad trends on the horizon, one could potentially be more well equipped to deal with challenges concerning the new cyber world order. ...
These emerging trends are beginning to point in the direction of an irreversible change in cyberspace.Materials and methods. ...
Already, the COVID-19 age has been seeing a massive increase in cyber security breaches. ...
doi:10.24833/2073-8420-2020-2-55-18-24
fatcat:mtxv4z7wdndknhjfv5pphixnwe
Cloud Forensics
[chapter]
2011
IFIP Advances in Information and Communication Technology
This paper discusses the emerging area of cloud forensics, and highlights its challenges and opportunities. ...
Cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of criminal activities in the cloud. ...
This paper discusses the emerging area of cloud forensics, and highlights its challenges and opportunities. ...
doi:10.1007/978-3-642-24212-0_3
fatcat:cwc2upqh7vdhxk72v5ei7xcqnq
Application of Block-Chain Technology in Healthcare Industry to Pursue COVID 19 Challenges
2021
International Journal for Research in Applied Science and Engineering Technology
provide important information about patients contact tracing, frauds in vaccination certificates, testing related data and medical supply related data. ...
This study proposes a narrative innovative approach for handling challenges of (COVID-19) pandemic and contagion. ...
respected to the threat of being failing to successfully secure and distribute vaccines, to all or any over the people in countries and breaching the logistics supply chain of vaccines for malicious purposes ...
doi:10.22214/ijraset.2021.37294
fatcat:6hvg4pdwxzbqvd5e73qlp6owq4
Counterfeiting Threats in IoT
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
We compiled a brief outline of the security breaches and the latest block chain application to implement security in IoT devices as work for future direction. ...
In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and counter measures to be adapted to safeguard from attacks. ...
Now, we brief the security attacks on IoT devices reported in the past. There are many incidents of data breaches and attacks in the past and still happening. ...
doi:10.35940/ijitee.a9121.119119
fatcat:dwjt4eo27vhh3ksqbhhibarqf4
Securing Cloud from Cloud Drain
[article]
2014
arXiv
pre-print
We have used the term Cloud-Drain to define data leakage in case of security compromise. ...
Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. ...
But since the consumers are unaware of physical locations, data breach is always a possible and valuable data may disappear without a trace. ...
arXiv:1407.6482v3
fatcat:dwc7jaeimjdadb75oslrduup6y
The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses
2021
Computers & security
In this paper, we consider the small business cyber-security challenges not currently addressed by research or products, contextualised via an Australian lens. ...
We conclude that there is a gap in current research in small business cyber-security. In addition, legal and policy work are needed to help small businesses become cyber-resilient. ...
In this paper, we trace these symptoms back to possible contributing factors, which could enable better security solutions. Heidt et al. ...
doi:10.1016/j.cose.2021.102385
fatcat:gsbvjzppzjec3an6x57wy4u6le
« Previous
Showing results 1 — 15 out of 34,274 results