Proceedings of the 12th International Conference on “Electronics, Communications and Computing" 2022
DOI: 10.52326/ic-ecco.2022/sec.01
|View full text |Cite
|
Sign up to set email alerts
|

A Differentiated Beneficiary Cybersecurity Approach

Abstract: The considerable losses caused by the low level of infospace’s cybersecurity and the limited financial resources available imply the need to found effective ways to improve the implementation of measures counteracting cyber-attacks. First, some aspects regarding the situation in the field are characterized, including: industries most targeted by cyber-attacks, common types of cyber-attacks, industries’ readiness to counteract cyber-attacks, and causes of cybersecurity breaches. Reducing the costs with cyber-se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 1 publication
0
0
0
Order By: Relevance