Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
paper cover icon
Cybersecurity

Cybersecurity

Implementing Computational Intelligence Techniques for Security Systems Design, 2020
Prof. Adel I . Al-Alawi
Abstract
The internet has revolutionized the way people communicate, how they manage their business, and even how they conduct their studies. Organizations can conduct meetings virtually and store all their data online. With this convenience, however, comes the risk of cybercrime (CC). Some of the world's most renowned organizations have found themselves having to incur huge recovery costs after falling prey to CC. Higher learning institutions' databases are increasingly falling victim to CCs, owing to the vast amounts of personal and research data they harbor. Despite this, the area of CCs in learning institutions remains understudied. This chapter seeks to identify how CC is manifested in such institutions and the specific cybersecurity measures that stakeholders could use to minimize their exposure to the same. The qualitative case study was designed to explore the research questions, and collected data through semistructured interviews. The findings showed hacking, phishing, and ...

Prof. Adel I . Al-Alawi hasn't uploaded this paper.

Let Prof. Adel know you want this paper to be uploaded.

Ask for this paper to be uploaded.