Belmabrouk, 2023 - Google Patents
Cyber criminals and data privacy measuresBelmabrouk, 2023
- Document ID
- 643088396068475564
- Author
- Belmabrouk K
- Publication year
- Publication venue
- Contemporary challenges for cyber security and data privacy
External Links
Snippet
Cyber criminals pose a significant threat to data privacy, seeking to exploit weaknesses in digital security systems to gain access to sensitive information. Data privacy measures, such as antivirus software, firewalls, and employee training, are implemented to protect against …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Arogundade | Network security concepts, dangers, and defense best practical | |
Singh et al. | E-governance: Information security issues | |
Hutchings et al. | Cloud computing for small business: Criminal and security threats and prevention measures | |
Belmabrouk | Cyber criminals and data privacy measures | |
Aijaz et al. | Security operations center—A need for an academic environment | |
Sarowa et al. | Analysis of attack patterns and cyber threats in healthcare sector | |
Firmansyah | Cybersecurity Fundamentals | |
Bidgoli | Integrating Real Life Cases Into A Security System: Seven Checklists For Managers. | |
Jawaid | Data Protection in Organization by the Implementation of Cyber Security | |
Rai et al. | Cyber Security | |
Shaikh et al. | Exploring recent challenges in cyber security and their solutions | |
Harris et al. | Cybersecurity in the golden state | |
Yakubdjanovna et al. | Analysis of Information Security Problems in Electronic Management with Possible Solutions | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Feagin | The value of cyber security in small business | |
Ahmed et al. | Corporate Information Security Policies Targeting Ransomw are Attack | |
O’Regan | Computer Crime | |
SOX | This White Paper | |
Teymourlouei | Preventative Measures in Cyber & Ransomware Attacks for Home & Small Businesses' Data | |
Bowerman | Cybersecurity threats and technology applications in homeland security | |
Pop | Prevention of Computer Crime through Knowledge of the Concept of Cyber Security | |
Waziri et al. | Data loss prevention and challenges faced in their deployments | |
Zhang et al. | Controlling Network Risk in E-commerce | |
Victor et al. | Data loss prevention and challenges faced in their deployments | |
Singh et al. | Security Challenges & Techniques to Prevent Cyber Crime Threats in Tourism Industry |