Literature review of information security practice survey reports
Authors
Date
2018Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics such as the security relevant problems, firms' practices, policies, evolving technologies, etc. In the discussion section, perspectives or frameworks from academic literature were brought in.
Keywords
information security cyber security computer security digital business information technology cyber attacks and breaches cyber intelligence kyberturvallisuus tietoverkkorikokset tietomurto tietosuoja tietoturva verkkohyökkäykset data haittaohjelmat netcrime data break-in data privacy data security cyber attacks malware
Metadata
Show full item recordCollections
- Pro gradu -tutkielmat [29561]
Related items
Showing items with similar title or keywords.
-
Artificial Intelligence for Cybersecurity : A Systematic Mapping of Literature
Wiafe, Isaac; Koranteng, Felix N.; Obeng, Emmanuel N.; Assyne, Nana; Wiafe, Abigail; Gulliver, Stephen R. (IEEE, 2020)Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can ... -
On Attacking Future 5G Networks with Adversarial Examples : Survey
Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo; Miraghaei, Parsa (MDPI AG, 2023)The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to ... -
APT Cyber-attack Modelling : Building a General Model
Lehto, Martti (Academic Conferences International Ltd, 2022)The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts ... -
Tietoturvakulttuurin rakentuminen Finavian viestinnässä
Seppänen, Teemu (2021)Tutkielman tavoitteena on kuvata ja ymmärtää tietoturvaviestinnän yhteyttä organisaation tietoturvakulttuurin rakentumiseen. Tietoturva on organisaatioille kasvava prioriteetti ja työntekijöiden rooli tietoturvan toteutumisessa ... -
Creating modern blue pills and red pills
Algawi, Asaf; Kiperberg, Michael; Leon, Roee; Resh, Amit; Zaidenberg, Nezer (Academic Conferences International, 2019)The blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package that is designed to detect such blue pills. Since the blue pill was originally proposed there has been an ongoing arms race ...