Cyber incident response and planning: a flexible approach

被引:0
|
作者
Shinde N.
Kulkarni P.
机构
来源
Computer Fraud and Security | 2021年 / 2021卷 / 01期
关键词
D O I
10.1016/S1361-3723(21)00009-9
中图分类号
学科分类号
摘要
The digital landscape is evolving at a rapid speed and it is causing a significant impact on global cyber security trends. In particular, cyber attacks are also changing their shape in terms of aspects such as targets and techniques.1 Studies have shown that information theft is the fastest-rising and the most expensive type of cybercrime, increasing at an alarming rate over the past few years. Previously, cyber criminals used to target data stored in various organisational information systems – such as financial data and identity data relating to individuals. However, trends show that cyber criminals have recently shifted their focus towards industrial control systems to disrupt industrial processes and destroy related data.2 © 2021 Elsevier Ltd
引用
收藏
页码:14 / 19
页数:5
相关论文
共 50 条
  • [31] Dynamic response of a group of flexible foundations to incident seismic waves
    Tham, LG
    Qian, J
    Cheung, YK
    SOIL DYNAMICS AND EARTHQUAKE ENGINEERING, 1998, 17 (02) : 127 - 137
  • [32] A Flexible Approach for Planning Schema Matching Algorithms
    Duchateau, Fabien
    Bellahsene, Zohra
    Coletta, Remi
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PART I, 2008, 5331 : 249 - 264
  • [33] A NEW APPROACH TO THE FLEXIBLE PLANNING PROBLEM (FPP)
    SOLOVEICHIK, D
    ANNALS OF THE NEW YORK ACADEMY OF SCIENCES, 1987, 491 : 264 - 273
  • [34] Machine learning approach to quick incident response
    Nila, Constantin
    Apostol, Ioana
    Patriciu, Victor
    2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 291 - 296
  • [35] A flexible approach for cyber threat hunting based on kernel audit records
    Fengyu Yang
    Yanni Han
    Ying Ding
    Qian Tan
    Zhen Xu
    Cybersecurity, 5
  • [36] A flexible approach for cyber threat hunting based on kernel audit records
    Yang, Fengyu
    Han, Yanni
    Ding, Ying
    Tan, Qian
    Xu, Zhen
    CYBERSECURITY, 2022, 5 (01)
  • [37] Efficient Incident Response System on Shared Cyber Threat Information Using SDN and STIX
    Okada, Satoshi
    Fujiwara, Yoshiki
    Fujimoto, Mariko
    Matsuda, Wataru
    Mitsunaga, Takuho
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO), 2021, : 109 - 114
  • [38] Mitigating Global Cyber Risk Through Bridging the National Incident Response Capacity Gap
    Dubois, Elisabeth
    Tatar, Unal
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 527 - 531
  • [39] Saudi Arabia's Response to Cyber Conflict: A case study of the Shamoon malware incident
    Dehlawi, Zakariya
    Abokhodair, Norah
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 73 - 75
  • [40] Development of a Cyber Incident Information Crawler
    Ikegami, Kazuki
    Yamada, Michihiro
    Kikuchi, Hiroaki
    Inui, Koji
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019, 2020, 994 : 447 - 455