Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Maxine Major"'
Autor:
Scott M. Slayback, Jose Romero-Mariona, Esperanza Romero, Francisco Tacliad, John San Miguel, Maxine Major, Richard Phipps, Roger A. Hallman
Publikováno v:
International Journal of Organizational and Collective Intelligence. 11:91-112
Much of modern life is dependent on networked critical infrastructure systems—many known to be susceptible to cyberattacks—such as the electrical grid, water purification, and transportation systems. The consequences of a successful cyberattack o
Autor:
Roger A. Hallman, Jose Romero-Mariona, Richard Phipps, John San Miguel, Esperanza Romero, Maxine Major
Publikováno v:
COMPLEXIS
Publikováno v:
CIC
The human side of cyber is fundamentally important to understanding and improving cyber operations. With the exception of Capture the Flag (CTF) exercises, cyber testing and experimentation tends to ignore the human attacker. While traditional CTF ev
Publikováno v:
CogMI
Cyber deception has typically been a tool used by attackers to mask reconnaissance activities and infiltrate networks while keeping hidden from watchful defenders. We believe the use of deception is a necessary component of network and system defense
Publikováno v:
HotSoS
As infamous hacker Kevin Mitnick describes in his book The Art of Deception, "the human factor is truly security's weakest link" [18]. Deception has been widely successful when used by hackers for social engineering and by military strategists in kin
Autor:
Lawrence Kerr, Josiah Bryan, Megan Kline, Geancarlo Palavicini, Jose Romero-Mariona, Roger A. Hallman, John San Miguel, Maxine Major, Jorge Alvarez
Publikováno v:
Enterprise Security ISBN: 9783319543796
ES
ES
Large organizations must plan for Cybersecurity throughout their entire network, taking into account network granularity and outside subcontractors. The United States Department of Defense (DoD) has large networked systems that span the globe, crossi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::954b7414f7c6c1942b5859d8b14b44e4
https://doi.org/10.1007/978-3-319-54380-2_9
https://doi.org/10.1007/978-3-319-54380-2_9
Autor:
John San Miguel, Braulio Coronado, Lawrence Kerr, Josiah Bryan, Megan Kline, Maxine Major, Jose Romero-Mariona, Geancarlo Palavicini, Roger A. Hallman
Publikováno v:
2016 Cybersecurity Symposium (CYBERSEC).
With the increasing connectedness of traditionally isolated devices, such as those found in Supervisory Control and Data Acquisition (SCADA) networks, comes the increasingly complex challenge of providing appropriate cybersecurity controls. SCADA net
Autor:
Jose Romero-Mariona, Lawrence Kerr, Megan Kline, John San Miguel, Maxine Major, Roger A. Hallman
Publikováno v:
Scopus-Elsevier
IoTBD
IoTBD
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4d53abe5ac3d465de756e0d575380244
http://www.scopus.com/inward/record.url?eid=2-s2.0-84979497695&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-84979497695&partnerID=MN8TOARS