{"title":"Cyber Roles","authors":"A. Evans","doi":"10.4324/9781003052616-7","DOIUrl":"https://doi.org/10.4324/9781003052616-7","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114438806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ransomware Strategies","authors":"A. Evans","doi":"10.4324/9781003052616-42","DOIUrl":"https://doi.org/10.4324/9781003052616-42","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114758059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack Surfaces and Digital Asset Inventory","authors":"A. Evans","doi":"10.4324/9781003052616-9","DOIUrl":"https://doi.org/10.4324/9781003052616-9","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130372772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GDPR Requirements","authors":"A. Evans","doi":"10.4324/9781003052616-35","DOIUrl":"https://doi.org/10.4324/9781003052616-35","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New York State Department of Financial Service Part 500","authors":"A. Evans","doi":"10.4324/9781003052616-21","DOIUrl":"https://doi.org/10.4324/9781003052616-21","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Auditing","authors":"A. Evans","doi":"10.4324/9781003052616-26","DOIUrl":"https://doi.org/10.4324/9781003052616-26","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Regulations, Standards, and Frameworks","authors":"A. Evans","doi":"10.4324/9781003052616-12","DOIUrl":"https://doi.org/10.4324/9781003052616-12","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130060969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The History of Cybersecurity","authors":"A. Evans","doi":"10.4324/9781003052616-4","DOIUrl":"https://doi.org/10.4324/9781003052616-4","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Threats of Today and Cybercriminals","authors":"A. Evans","doi":"10.4324/9781003052616-11","DOIUrl":"https://doi.org/10.4324/9781003052616-11","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131756623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Control Assessments and Cyber Risk","authors":"A. Evans","doi":"10.4324/9781003052616-30","DOIUrl":"https://doi.org/10.4324/9781003052616-30","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}