A Global Approach to Assure Protection of Data
Abstract
Full Text:
PDFReferences
"A Decade at Google", Alon Halevy, ACM SIGMOD, September 20, 2015 http://wp.sigmod.org/?p=1851
"The Real Story of Stuxnet", David Kushner, IEEE SPECTRUM. Feb 2013, http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
“Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually,” Sept. 7, 2011, www.symantec.com/about/news/release/article.jsp?prid=20110907 _02
“2011 Cost of Data Breach Study,” Ponemon Institute LLC, March 2012, www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.enus.pdf?om_ext_cid=biz_socmed_twitter_facebook_marketwir e_linkedin_2012Mar_worldwide__CODB_US
"Target cyber breach hits 40 million payment cards at holiday peak", By Jim Finkle and Dhanya Skariachan, Technology News,Dec 19, 2013 , http://www.reuters.com/article/us-target-breach-idUSBRE9BH1GX20131219
"PlayStation Network hackers access data of 77 million users" Ben Quinn and Charles Arthur, The Guardian, 26 April 2011 https://www.theguardian.com/technology/2011/apr/26/playstation-network-hackers-data
https://en.wikipedia.org/wiki/Threat_(computer)
"A Survey of Insider Attack Detection Research", Malek Ben Salem, Shlomo Hershkop Salvatore J. Stolfo http://lasr.cs.ucla.edu/classes/239_1.fall10/papers/Insider_survey.pdf .
DOI: https://doi.org/10.23956/ijarcsse.v7i10.260
Refbacks
- There are currently no refbacks.