Goh, 2021 - Google Patents
Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humansGoh, 2021
- Document ID
- 3370205216859564177
- Author
- Goh P
- Publication year
- Publication venue
- Introduction to cyber forensic psychology: Understanding the mind of the cyber deviant perpetrators
External Links
Snippet
Concerns in the area of cybersecurity have recently been placed under the spotlight, particularly so when 2017 saw a substantial number of cyberattacks and security breaches across the world [Graham, 2017; Leech, 2017]. In April 2019, the passwords and photos of …
- 241000545744 Hirudinea 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wasserman et al. | Hospital cybersecurity risks and gaps: Review (for the non-cyber professional) | |
Offner et al. | Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation | |
Kalhoro et al. | Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review | |
Maennel et al. | Cyber hygiene: The big picture | |
Ayanbode et al. | Human factors in fintech cybersecurity: addressing insider threats and behavioral risks | |
Death | Information security handbook | |
Huang et al. | Security and privacy concerns in ChatGPT | |
Jaber et al. | COVID-19 and global increases in cybersecurity attacks: review of possible adverse artificial intelligence attacks | |
Goh | Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humans | |
Okuku et al. | Cybersecurity strategy's role in raising Kenyan awareness of mobile security threats | |
Alharthi et al. | Social engineering defense mechanisms: A taxonomy and a survey of employees’ awareness level | |
Mateus-Coelho et al. | Exploring cyber criminals and data privacy measures | |
Papathanasiou et al. | Cybersecurity guide for SMEs: Protecting small and medium-sized enterprises in the digital era | |
Singh et al. | Cyber-security knowledge and practice of nurses in private hospitals in northern Durban, kwazulu-Natal | |
Bhatia | A Comprehensive Review on the Cyber Security Methods in Indian Organisation. | |
Aslaner | Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques | |
Kessler | Effectiveness of the protection motivation theory on small business employee security risk behavior | |
Antipova et al. | Managing cyber resilience literacy for consumers | |
Moinescu et al. | Aspects of Human Weaknesses in Cyber Security. | |
Maleh | Web application PenTesting: A comprehensive Guide for professionals | |
Alaaraj et al. | Investigating cybersecurity response strategies: Measures to responding to successful spear phishing attacks | |
Antony et al. | Ransomware attacks on healthcare systems: Case studies and mitigation strategies | |
Bishop | Cybersecurity Culture | |
Khidzir et al. | Guardians of Data: A Comprehensive Guide to Digital Data Protection | |
Maseko | Remedies to reduce user susceptibility to phishing attacks |