843 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Este artigo é parte do relatório Cybersecurity Are We Ready in Latin America and the Caribbean?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract There has been a great deal of interest in the area of cyber security in recent years. But what is cyber security exactly? And should society really care about it? We look at some of the challenges of being an academic working in the area of cyber security and explain why cyber security is, to put it rather simply, hard! Speaker Biography Keith Martin Prof. Keith Martin is Professor of Information Security at Royal Holloway, University of London. He received his BSc (Hons) in Mathematics from the University of Glasgow in 1988 and a PhD from Royal Holloway in 1991. Between 1992 and 1996 he held a Research Fellowship at the University of Adelaide, investigating mathematical modelling of cryptographic key distribution problems. In 1996 he joined the COSIC research group of the Katholieke Universiteit Leuven in Belgium, working on security for third generation mobile communications. Keith rejoined Royal Holloway in January 2000, became a Professor in Information Security in 2007 and was Director of the Information Security Group between 2010 and 2015. Keith's research interests range across cyber security, but with a focus on cryptographic applications. He is the author of 'Everyday Cryptography' published by Oxford University Press.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis presents security issues and vulnerabilities in home and small office local area networks that can be used in cyber-attacks. There is previous research done on single vulnerabilities and attack vectors, but not many papers present full scale attack examples towards LAN. First this thesis categorizes different security threads and later in the paper methods to launch the attacks are shown by example. Offensive security and penetration testing is used as research methods in this thesis. As a result of this thesis an attack is conducted using vulnerabilities in WLAN, ARP protocol, browser as well as methods of social engineering. In the end reverse shell access is gained to the target machine. Ready-made tools are used in the attack and their inner workings are described. Prevention methods are presented towards the attacks in the end of the thesis.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Managing a variable demand scenario is particularly challenging on services organizations because services companies usually have a major part of fixed costs. The article studies how a services organization manages its demand variability and its relation with the organization`s profitability. Moreover, the study searched for alternatives used to reduce the demand variability`s impact on the profitability of the company. The research was based on a case study with a Brazilian services provider on information technology business. The study suggests that alternatives like using outsourced employees to cover demand peaks may bring benefits only on short term, reducing the profitability of the company on long term: Some options are revealed, like the internationalization of employees and the investment on developing its own workforce.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The authors are developing a pilot project for a Municipality in the North of Portugal, envisaging the definition and implementation of an e-marketplace for healthcare and social services, in order to facilitate the interaction between healthcare and social services professionals and people with special needs (or their relatives). Based on the results of a survey on user needs analysis and expectations conducted in 2011, the paper discusses the relevance and interest of such platforms and the main drivers and motivations of the population for using such services, as well as which services would motivate citizens to use the platform. The results of the study will be used to select the products and services perceived to be the most desired by the potential users. The paper thus makes three main contributions: (1) the results of the study confirm the interest and the perceived potential of such a service, from the end-users perspective; (2) the findings support the advantage of expanding this pilot project to a full scale implementation; and (3) the performed analysis improves our understanding of the relations between the characteristics of the inquired population and the perceived interest in such platforms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertation presented to obtain a Masters degree in Computer Science

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação apresentada como requisito parcial para obtenção do grau de Doutor em Gestão de Informação

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study aims to analyze and compare micro-firms’ organizational culture related to organizational performance. A case study methodology was used based on four firms, competitors among themselves in the Information Technology business, focusing on the years between 2008-2013. Findings pointed out many similarities to larger firms, but some specificities of micro-firms were found and propositions were defined: clan culture predominance is related to best performing micro-firms; the configuration of several culture types seemed to be the most suitable for obtaining good organizational results, provided that they do not focus only on hierarchy and market types of culture; the market culture predominance perception by employees is associated with low job satisfaction; and, after a certain time in business, micro-firms, as do larger companies, seek to standardize and control processes. Recognizing that organizational culture is considered important to firms’ results, this study sheds some light on that important factor for micro-firms.