Search results
6 sty 2020 · PDF | There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats... | Find, read and cite all the...
29 paź 2023 · Thesis PDF Available. A Comprehensive Analysis of High-Impact Cybersecurity Incidents: Case Studies and Implications. October 2023. DOI: 10.13140/RG.2.2.17461.65763. Thesis for: Master`s...
the leak of billions of data points in recent years? New data protection and privacy laws and recent cyber security regulations, such as the General Data Protection Regulation (GDPR) that went into effect in Europe in 2018, demonstrate a strong trend and growing concern on how to protect businesses and cu.
1 sty 2023 · In this paper, we perform a comprehensive review and analysis of typical data breach incidents. We investigate threat actors, security flaws, and vulnerabilities that often lead to data...
This case study will first consider Target’s vulnerabilities to an external attack in 2013 and explain how the attackers stole the data. Second, this case study will discuss the importance of corporate responses to data breaches when they do happen, using Target as an example.
1 sty 2019 · Although the types of breaches are different, the impacts are always the same. This paper focuses on analyzing over 9000 data breaches made public since 2005 that led to the loss of 11,5 billion individual records which have a significant financial and technical impact.
11 mar 2023 · This part of the study extensively discusses widely known cyber threats, security risks, vulnerabilities, and attacks. First, viruses, Trojans, worms, rootkits, and hackers are examined as cyber threats. Then, known threats such as spyware, scareware, joke programs, and ransomware are explained.