[go: up one dir, main page]

Goh, 2021 - Google Patents

Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humans

Goh, 2021

Document ID
3370205216859564177
Author
Goh P
Publication year
Publication venue
Introduction to cyber forensic psychology: Understanding the mind of the cyber deviant perpetrators

External Links

Snippet

Concerns in the area of cybersecurity have recently been placed under the spotlight, particularly so when 2017 saw a substantial number of cyberattacks and security breaches across the world [Graham, 2017; Leech, 2017]. In April 2019, the passwords and photos of …
Continue reading at www.worldscientific.com (other versions)

Similar Documents

Publication Publication Date Title
Wasserman et al. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional)
Offner et al. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation
Kalhoro et al. Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
Maennel et al. Cyber hygiene: The big picture
Ayanbode et al. Human factors in fintech cybersecurity: addressing insider threats and behavioral risks
Death Information security handbook
Huang et al. Security and privacy concerns in ChatGPT
Jaber et al. COVID-19 and global increases in cybersecurity attacks: review of possible adverse artificial intelligence attacks
Goh Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humans
Okuku et al. Cybersecurity strategy's role in raising Kenyan awareness of mobile security threats
Alharthi et al. Social engineering defense mechanisms: A taxonomy and a survey of employees’ awareness level
Mateus-Coelho et al. Exploring cyber criminals and data privacy measures
Papathanasiou et al. Cybersecurity guide for SMEs: Protecting small and medium-sized enterprises in the digital era
Singh et al. Cyber-security knowledge and practice of nurses in private hospitals in northern Durban, kwazulu-Natal
Bhatia A Comprehensive Review on the Cyber Security Methods in Indian Organisation.
Aslaner Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
Kessler Effectiveness of the protection motivation theory on small business employee security risk behavior
Antipova et al. Managing cyber resilience literacy for consumers
Moinescu et al. Aspects of Human Weaknesses in Cyber Security.
Maleh Web application PenTesting: A comprehensive Guide for professionals
Alaaraj et al. Investigating cybersecurity response strategies: Measures to responding to successful spear phishing attacks
Antony et al. Ransomware attacks on healthcare systems: Case studies and mitigation strategies
Bishop Cybersecurity Culture
Khidzir et al. Guardians of Data: A Comprehensive Guide to Digital Data Protection
Maseko Remedies to reduce user susceptibility to phishing attacks