Filters








34,274 Hits in 6.7 sec

Opportunities and Challenges in Tracing Security Breaches [chapter]

Michael Gertz
2003 IFIP Advances in Information and Communication Technology  
The closing session of the working conference was a panel discussion on challenges and recent developments in tracing security breaches of information systems that manage mission critical data.  ...  The panel members were (in alphabetical order):  ...  The role of security and the aspect of tracing security breaches in particular were illustrated by Cristina Buchholz in the context of a Web services infrastructure employed by SAP.  ... 
doi:10.1007/978-0-387-35693-8_15 fatcat:twoqbjmiffbylbuk5p2njz2pkm

Health Data Privacy: Research Fronts, Hot Topics and Future Directions [chapter]

Javad Pool, Farhad Fatehi, Farkhondeh Hassandoust, Saeed Akhlaghpour
2020 Studies in Health Technology and Informatics  
Finally, we chart directions for future research on health data privacy, highlighting emerging topics, and boundary-breaking alternatives (e.g., GDPR, contact tracing apps in the context of pandemics).  ...  We conducted a literature search between 2010 and 2020 in the Web of Science (WoS) database, resulted in 1,752 records.  ...  ., GDPR and privacy in the context of contact tracing apps in pandemics. Theses research opportunities are worth exploring to inform research, policy, and data protection practices.  ... 
doi:10.3233/shti200716 pmid:33227762 fatcat:ff2yqqy2kvfcthzrswhuqfjcxq

Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities [chapter]

Mohammed I. Alghamdi
2021 Cybersecurity Threats with New Perspectives  
However, this transition has also result in the emergence of cybercrimes and security breach incidents that threatens the privacy and security of the users.  ...  However, the research has also observed specific threats to digital forensics, which include technical, operational and personnel-related challenges.  ...  Such traces can assist forensic investigators in identifying Digital Forensics in Cyber Security-Recent Trends, Threats, and Opportunities DOI: http://dx.doi.org/10.5772/intechopen.94452 various file-related  ... 
doi:10.5772/intechopen.94452 fatcat:dg6xxu5tyfawhjomggmyi3znzq

The Second Round of Information Security Challenges at TJX Companies

Courtney Gatlin-Keener, Ryan Lunsford
2021 Zenodo  
Based on UpGuard's third-party report, it was discovered that despite the purported recovery from a 2007 TJX data breach debacle and supposed enhancements in its digital infrastructure, there are still  ...  over $40B in sales and a market value of over $62B.  ...  Carol Meyrowitz was CEO of TJX during its most challenging time in 2007 when the globally dominant off-price discount chain was rocked by a humongous credit card security breach crisis (Davidson 2009  ... 
doi:10.5281/zenodo.4639611 fatcat:cat2yo3pf5d5ddf57jo2tuegua

A Security Management Framework for Telecommunications in Africa

Ezekiel Uzor Okike, Ernest Boikobo Seboko
2022 Journal of Internet Technology and Secured Transaction  
In this paper we identify the security challenges associated with Internet based services especially in the telecommunications domain.  ...  With a focus on the African telecommunications environment and the associated technological challenges, an analysis of the Strength, Weaknesses, Opportunities and Threats (SWOT) is presented with a viewing  ...  The Impact of Security Breaches Security breaches often result in losses in the ICT equipment and pertinent data which comes with a huge economic cost, in terms of loss of revenue in replacing expensive  ... 
doi:10.20533/jitst.2046.3723.2022.0093 fatcat:hjqznlwk5bfqzai4h6gpupscfe

What engineers should know about US security and privacy law

Travis Breaux, David Gordon
2013 IEEE Security and Privacy  
In this article, we examine how emerging US security and privacy laws create new requirements that constrain software development, affecting business owners and developers who want to design security and  ...  A s new technology challenges our assumptions about security and privacy, lawmakers respond by attempting to curb and avoid the most egregious risks to the public.  ...  What Engineers Should Know about US Security and Privacy Law Travis Breaux and David Gordon | Carnegie Mellon University A s new technology challenges our assumptions about security and privacy, lawmakers  ... 
doi:10.1109/msp.2013.74 fatcat:uwqzb57hmzae7lygc3inmthhce

Enterprise data breach: causes, challenges, prevention, and future directions

Long Cheng, Fang Liu, Danfeng Daphne Yao
2017 Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery  
solutions and exciting opportunities.  ...  As the volume of data is growing exponentially and data breaches are happening more frequently than ever before, detecting and preventing data loss has become one of the most pressing security concerns  ...  The volume, variety, and velocity of big data bring both opportunities and challenges for nearly real-time identifying data leak threats.  ... 
doi:10.1002/widm.1211 fatcat:reuwnplyezenfpkjniywn62dey

The Quest for Data Transparency

Elisa Bertino
2020 IEEE Security and Privacy  
Data transparency is the ability of subjects to effectively gain access to all information related to data used in processes and decisions that affect the subjects." www.computer.org/security Elisa Bertino  ...  Contact her at bertino@purdue.edu. continued from p. 68 Last Word Often individuals are not aware of the digital traces they leave around that are collected by a variety of parties.  ...  In such case, subjects for whom data transparency is critical are individuals that within organizations are responsible for compliance and data security and privacy.  ... 
doi:10.1109/msec.2020.2980593 fatcat:f2u4kj5tdfgwvi5arti57qw3zy

Security or Breach – Enterprise to Decide

Devesh Mishra, Vishal Goel, Virbahu Jain, Columbia University
2018 International Journal of Engineering Research and  
Enterprise Security Challenges have been an ongoing discussion in the professional world at the CIO/ CISO level, but the most important question is how and what we are doing about it?  ...  Are we well informed and prepared in fighting the APT's? How effective our security layer is to identify an attack sooner than later?  ...  Any security breach doesn't only affect the data or data points but the entire organization reputation and inflict lasting brand damage, resulting loss in business opportunities.  ... 
doi:10.17577/ijertv7is040428 fatcat:b3xqyuwiwrdi7llsssqmyplb4a

A New Order in Cyberspace Awaits us

P. Duggal
2020 Journal of Law and Administration  
However, if one keeps in mind the broad trends on the horizon, one could potentially be more well equipped to deal with challenges concerning the new cyber world order.  ...  These emerging trends are beginning to point in the direction of an irreversible change in cyberspace.Materials and methods.  ...  Already, the COVID-19 age has been seeing a massive increase in cyber security breaches.  ... 
doi:10.24833/2073-8420-2020-2-55-18-24 fatcat:mtxv4z7wdndknhjfv5pphixnwe

Cloud Forensics [chapter]

Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
2011 IFIP Advances in Information and Communication Technology  
This paper discusses the emerging area of cloud forensics, and highlights its challenges and opportunities.  ...  Cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of criminal activities in the cloud.  ...  This paper discusses the emerging area of cloud forensics, and highlights its challenges and opportunities.  ... 
doi:10.1007/978-3-642-24212-0_3 fatcat:cwc2upqh7vdhxk72v5ei7xcqnq

Application of Block-Chain Technology in Healthcare Industry to Pursue COVID 19 Challenges

Mr. Chetan R. Pawar
2021 International Journal for Research in Applied Science and Engineering Technology  
provide important information about patients contact tracing, frauds in vaccination certificates, testing related data and medical supply related data.  ...  This study proposes a narrative innovative approach for handling challenges of (COVID-19) pandemic and contagion.  ...  respected to the threat of being failing to successfully secure and distribute vaccines, to all or any over the people in countries and breaching the logistics supply chain of vaccines for malicious purposes  ... 
doi:10.22214/ijraset.2021.37294 fatcat:6hvg4pdwxzbqvd5e73qlp6owq4

Counterfeiting Threats in IoT

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
We compiled a brief outline of the security breaches and the latest block chain application to implement security in IoT devices as work for future direction.  ...  In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and counter measures to be adapted to safeguard from attacks.  ...  Now, we brief the security attacks on IoT devices reported in the past. There are many incidents of data breaches and attacks in the past and still happening.  ... 
doi:10.35940/ijitee.a9121.119119 fatcat:dwjt4eo27vhh3ksqbhhibarqf4

Securing Cloud from Cloud Drain [article]

Niva Das, Tanmoy Sarkar
2014 arXiv   pre-print
We have used the term Cloud-Drain to define data leakage in case of security compromise.  ...  Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers.  ...  But since the consumers are unaware of physical locations, data breach is always a possible and valuable data may disappear without a trace.  ... 
arXiv:1407.6482v3 fatcat:dwc7jaeimjdadb75oslrduup6y

The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses

Tracy Tam, Asha Rao, Joanne Hall
2021 Computers & security  
In this paper, we consider the small business cyber-security challenges not currently addressed by research or products, contextualised via an Australian lens.  ...  We conclude that there is a gap in current research in small business cyber-security. In addition, legal and policy work are needed to help small businesses become cyber-resilient.  ...  In this paper, we trace these symptoms back to possible contributing factors, which could enable better security solutions. Heidt et al.  ... 
doi:10.1016/j.cose.2021.102385 fatcat:gsbvjzppzjec3an6x57wy4u6le
« Previous Showing results 1 — 15 out of 34,274 results