The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cyber Security: Cyber Risk Challenges for Future Leaders and Businesses
Abstract
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence. One of the many disturbing consequences of this is that we are faced with attackers that are versed in stealth, deception, planting false information, and increased training in newer attack technologies that classical tools can no longer reliably find. In addition, advanced attack and deception skills now use OSINT (open source intelligence) data collection tactics that have moved entire attack chains into the espionage and surveillance realm.
Related Content
Monia Ben Ltaifa, Walid Chouari, Abdelkader Mohamed Sghaier Derbali.
© 2024.
30 pages.
|
Filiz Mızrak.
© 2024.
21 pages.
|
Aytaç Gökmen.
© 2024.
12 pages.
|
Maria Aweis Mayow, Aytaç Gökmen, Dilek Temiz.
© 2024.
27 pages.
|
Ahlem Baccouche, Houssem Bouzgarrou, Meriem Jouirou, Moufida Ben Saada.
© 2024.
21 pages.
|
Ashwani Panesar, Rohit Sood.
© 2024.
20 pages.
|
Boussairi Slimani, Moufida Ben Saada, Sameh Halaoua.
© 2024.
22 pages.
|
|
|