Cybersecurity Fundamentals最新文献

筛选
英文 中文
Computers and Networks 计算机和网络
Cybersecurity Fundamentals Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-1
Kutub Thakur, A. Pathan
{"title":"Computers and Networks","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-1","DOIUrl":"https://doi.org/10.1201/9781003035626-1","url":null,"abstract":"","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114963019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Network Security 无线网络安全
Cybersecurity Fundamentals Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-9
Kutub Thakur, A. Pathan
{"title":"Wireless Network Security","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-9","DOIUrl":"https://doi.org/10.1201/9781003035626-9","url":null,"abstract":"With the penetration of mobile device use as well as embedded and cyber-physical systems deployment, the underlying wireless communication and network systems have become critical society infrastructures, and thus their security and privacy are critical to the wellbeing of our society. This course will exam the challenges in providing secure communication and network services in a variety of wireless systems, as well as the existing and emerging approaches to managing these challenges. Focus will be placed on securing the operation and performance of wireless networks, with less emphasis on information security. Topics to be covered include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and crosslayer holistic attacks. Systems of interest include, but are not limited to, personal devices, connected vehicles, IoT and cyber-physical systems, wireless infrastructure, and ad hoc networks.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Device Security 移动设备安全
Cybersecurity Fundamentals Pub Date : 2020-04-28 DOI: 10.1201/b18165-21
Kutub Thakur, A. Pathan
{"title":"Mobile Device Security","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/b18165-21","DOIUrl":"https://doi.org/10.1201/b18165-21","url":null,"abstract":"Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"44 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141209849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 193
Password Management 密码管理
Cybersecurity Fundamentals Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-7
Kutub Thakur, A. Pathan
{"title":"Password Management","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-7","DOIUrl":"https://doi.org/10.1201/9781003035626-7","url":null,"abstract":"New! Self-service password reset Starting Sept. 23 Systems Administration employees can now reset their CU account passwords themselves. With this new service, you will be able to reset your own password if it is expired or forgotten from anywhere, 24/7 rather than contacting the Service Desk after you enroll in this new service. Once you have enrolled, use our How to Guide [3] for step-by-step instructions or head to the password reset page [4]. Enrollment To participate in self-service password, System Administration employees must opt-in to the service. This allows us to authenticate your back-up email to reset your password with a personal account from anywhere, 24/7. Haven’t enrolled yet? An email will be sent to all System Administration staff Monday, Sept. 23 from noreplyauthmanager@cu.edu [5]. Can’t find the enrollment email? Manage your enrollment [6]or Contact the Service Desk [7]. We also have a How to Guide [8] to help.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Device Security 移动设备安全
Cybersecurity Fundamentals Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-11
Fei Yu
{"title":"Mobile Device Security","authors":"Fei Yu","doi":"10.1201/9781003035626-11","DOIUrl":"https://doi.org/10.1201/9781003035626-11","url":null,"abstract":"Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cybersecurity Basics 网络安全基础知识
Cybersecurity Fundamentals Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-2
Kutub Thakur, A. Pathan
{"title":"Cybersecurity Basics","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-2","DOIUrl":"https://doi.org/10.1201/9781003035626-2","url":null,"abstract":"","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity Standards 网络安全标准
Cybersecurity Fundamentals Pub Date : 2020-04-28 DOI: 10.1201/9781003035626-12
Kutub Thakur, A. Pathan
{"title":"Cybersecurity Standards","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-12","DOIUrl":"https://doi.org/10.1201/9781003035626-12","url":null,"abstract":"","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128607257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信