Listing 1 - 10 of 3067 | << page >> |
Sort by
|
Choose an application
The rise of Artificial Intelligence applications is accelerating the pace and magnitude of the political, securitarian, and ethical challenges we are now struggling to manage in cyberspace and beyond. So far, the relationship between Artificial Intelligence and cyberspace has been investigated mostly in terms of the effects that AI could have on the digital domain, and thus on our societies. What has been explored less is the opposite relationship, namely, how the cyberspace geopolitics can affect AI. Yet, AI applications have so far suffered from growing unrest, disorder, and lack of normative solutions in cyberspace. As such, from algorithm biases, to surveillance and offensive applications, AI could accelerate multiple growing threats and challenges in and through cyberspace. This report by ISPI and The Brookings Institution is an effort to shed light on this less studied, but extremely relevant, relationship.
Choose an application
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.
Computer security. --- cyber-terrorism --- cyber crime --- cyber domain --- cyber commands --- cyber security --- cyberwar --- deterrence
Choose an application
Central Bank Digital Currencies and Global Financial System: Theory and Practice is the perfect book for anyone interested in the impact of digital currencies on the global financial system, providing valuable insights and analysis on the topic. The topic of central bank digital currencies (CBDCs) is particularly relevant in 2023 because the use of digital currencies is rapidly growing around the world, and many central banks are exploring the idea of developing their own CBDCs. This book offers readers an opportunity to gain a better understanding of CBDCs, including their history, differences with cryptocurrencies, and the potential impact of CBDCs on the future of the financial system. The book’s didactic approach breaks down complex topics into easily digestible chapters, allowing readers to easily understand and follow the progression of digital currencies. For those interested in the future of digital currencies, the book offers a chapter on future research directions and concluding remarks. Central Bank Digital Currencies and Global Financial System: Theory and Practice is a must-read for anyone interested in the intersection of finance and technology. By exploring the evolution of digital currencies and their impact on the global financial system, this book provides valuable insights for policymakers, financial professionals, and anyone looking to understand the future of money.
Central bank digital currency (CBDC). --- central bank. --- cryptocurrencies. --- cyber security. --- privacy.
Choose an application
Selected papers from the World Environmental and Water Resources Congress 2020, held in Henderson, Nevada, May 17–21, 2020. Sponsored by the Environmental and Water Resources Institute of ASCE.This collection contains8 peer-reviewed papers on emerging and innovative technologies in water and environmental engineering.Topics include: cybersecurity and urban water infrastructure; smart technologies and water, wastewater, and stormwater; and international issues in water management.This proceedings will be of interest to practitioners and researchers in all areas of water resources engineering.
Water resources management. --- Water resources --- Innovation --- Stormwater management --- Cyber security --- Municipal water --- Infrastructure --- Artificial intelligence and machine learning --- Municipal wastewater
Choose an application
Noch vor wenigen Jahren war die IT-Sicherheit eher ein Randgebiet, doch inzwischen ist sie in der Informatik, in Unternehmen und auch im Alltagsleben allgegenwärtig. Immer mehr Menschen wird bewusst, dass sie nicht nur gläsern geworden sind, sondern dass sie selbst oder ihr Unternehmen, in dem sie arbeiten, von Bedrohungen ganz konkret gefährdet sind. Schadsoftware verschlüsselt unerwartet alle erreichbaren Daten und erpresst Lösegeld. Firmen werden massiv geschädigt oder gar insolvent, weil ihre Geschäftsgeheimnisse von der Konkurrenz gestohlen werden. Sogar Menschenleben stehen auf dem Spiel, wenn Energieversorger oder Krankenhäuser wegen eines Hackerangriffs funktionsunfähig werden. Ob es sich um die Entwicklung von Software handelt, um die Konfiguration von Netzwerken, Servern und Clients oder mittlerweile auch um Embedded Systems in Fahrzeugen oder der Unterhaltungselektronik - überall sind Kenntnisse der IT-Sicherheit gefragt. Gleichzeitig ist die IT-Sicherheit keine einfache Disziplin: Es kommen in großem Umfang kryptografische Verfahren zum Einsatz, die auf fortgeschrittenen mathematischen Grundlagen beruhen. Ferner spielen außer technischen Belangen und ihren komplexen Zusammenhängen auch rechtliche und Management-Aspekte eine Rolle. Genauso unterschiedlich werden die Vorkenntnisse sein, die Leser mitbringen und die Erwartungen, die sie hegen. Dieses Werk soll Studierenden der Informatik und verwandter Disziplinen helfen, ein grundlegendes Verständnis für die IT-Sicherheit und deren Bedeutung zu entwickeln. Es werden möglichst wenige mathematisch-technische Vorkenntnisse vorausgesetzt, so dass auch Studierende im Informatik-Grundstudium sowie technisch interessierte Studierende der Wirtschaftsinformatik, des Wirtschaftsingenieurwesens oder auch der Betriebswirtschaft davon profitieren sollten. Zu den einzelnen Kapiteln werden Übungsaufgaben gestellt, deren Lösungen im Anhang zu finden sind. Diese machen das Werk besonders geeignet für das Selbststudium. Inhalt: - Grundlagen und Motivation - Kryptologie und ihre Anwendung: Verschlüsselung, Digitale Signatur, Steganographie - Verfügbarkeit - Internetsicherheit und Schadsoftware - Firewalls - Sicherheit im Internet der Dinge
Information technology --- Computer networks --- Database security. --- Management. --- Security measures. --- IT security. --- cryptology. --- cyber security. --- data security. --- information security.
Choose an application
From manufacturing to chemical and petroleum processing to municipal utilities, you will find an industrial control system at the heart of these industries. Yet they were rarely designed to be secure from tampering or other threats. They were designed to be practical--to permit instant access by the operator to the control system. Learn about serious electronic threats and the all-too-common lack of security in industrial control systems. You will learn about the differences between enterprise IT security and industrial control security. And you will learn about functional security--a set of practices adapted from the world's industrial safety standards.
Process control --- Automatic control --- Automation --- Safety measures. --- Industrial Control Systems --- SCADA --- Process Controls --- Cyber Security --- Critical Infrastructure Protection --- Smart Grid
Choose an application
This thesis has been written as a consultancy report for the company NRB. Based on a literature review and digital marketing concepts, this project-dissertation develops a digital strategy for one of the cyber-security solution of the company on the industrial sector. This strategy meets the business and marketing objectives of NRB. In the future, the strategy can be used as a roadmap to help the marketing department to support the buying process. Therefore, three distinct sections will be studied. The literature review starts with a discussion about the evolution of the business-to-business buying process through the digital revolution followed by the role of marketing in the buying process. Then, a study is conducted to analyze how the digital marketing and more specifically the social networks can support the marketing during the customer journey. The next section is composed of several chapters related to a pre-project study essential to the development of a relevant digital marketing strategy. First, a chapter is dedicated to an intern audit of the marketing department at NRB. Then, the portfolio cyber-security of NRB and its new solution called "Security Operation Center" is detailed. The third chapter is committed to the functioning of the industrial sector. Finally, an analyze of the pre-prospection process for the cyber-security solution and the results is conducted. In the last section, the digital marketing strategy is elaborated. It will begin by setting out the objectives and how the strategy will be formulated in terms of targets, messages and budgets. Then, the implementation of the strategy is detailed followed by the key indicators performance. The last chapter is a demonstration of how the management problem has been deal with a link to business ethics and sustainable development. The project-thesis is concluded with some personal recommendations and conclusions.
Digital marketing --- digital strategy --- social networks --- business-to-business --- B2B buying process --- customer journey --- leads --- cyber-security --- industrial sector --- security operation center --- Sciences économiques & de gestion > Marketing
Choose an application
Internet policy --- Internet regulation --- Internet governance --- Intellectual property --- Cyber security --- Privacy --- Internet --- Government policy --- Government policy. --- Europe. --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Council of Europe countries --- Eastern Hemisphere --- Eurasia --- internet policy --- internet regulation --- internet governance --- intellectual property --- cyber security --- privacy
Choose an application
Electronic discovery (Law) --- Law --- Regional and International Law --- digital forensics --- cyber forensics --- law --- security --- cyber security --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law)
Choose an application
Computer security --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security measures --- Data protection --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Listing 1 - 10 of 3067 | << page >> |
Sort by
|