University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Pro gradu -tutkielmat
  • View Item
JYX > Opinnäytteet > Pro gradu -tutkielmat > View Item

Literature review of information security practice survey reports

Thumbnail
View/Open
2.0 Mb

Downloads:  
Show download detailsHide download details  
Authors
Yang, Yaping
Date
2018
Discipline
TietojenkäsittelytiedeComputer Science
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.

 
The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics such as the security relevant problems, firms' practices, policies, evolving technologies, etc. In the discussion section, perspectives or frameworks from academic literature were brought in.
Keywords
information security cyber security computer security digital business information technology cyber attacks and breaches cyber intelligence kyberturvallisuus tietoverkkorikokset tietomurto tietosuoja tietoturva verkkohyökkäykset data haittaohjelmat netcrime data break-in data privacy data security cyber attacks malware
URI

http://urn.fi/URN:NBN:fi:jyu-201809064034

Metadata
Show full item record
Collections
  • Pro gradu -tutkielmat [24534]

Related items

Showing items with similar title or keywords.

  • Artificial Intelligence for Cybersecurity : A Systematic Mapping of Literature 

    Wiafe, Isaac; Koranteng, Felix N.; Obeng, Emmanuel N.; Assyne, Nana; Wiafe, Abigail; Gulliver, Stephen R. (IEEE, 2020)
    Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can ...
  • APT Cyber-attack Modelling : Building a General Model 

    Lehto, Martti (Academic Conferences International Ltd, 2022)
    The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts ...
  • Tietoturvakulttuurin rakentuminen Finavian viestinnässä 

    Seppänen, Teemu (2021)
    Tutkielman tavoitteena on kuvata ja ymmärtää tietoturvaviestinnän yhteyttä organisaation tietoturvakulttuurin rakentumiseen. Tietoturva on organisaatioille kasvava prioriteetti ja työntekijöiden rooli tietoturvan toteutumisessa ...
  • Creating modern blue pills and red pills 

    Algawi, Asaf; Kiperberg, Michael; Leon, Roee; Resh, Amit; Zaidenberg, Nezer (Academic Conferences International, 2019)
    The blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package that is designed to detect such blue pills. Since the blue pill was originally proposed there has been an ongoing arms race ...
  • On Attacking Future 5G Networks with Adversarial Examples : Survey 

    Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo; Miraghaei, Parsa (MDPI AG, 2023)
    The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre