2020
DOI: 10.1049/iet-ifs.2018.5647
|View full text |Cite
|
Sign up to set email alerts
|

How to build a vulnerability benchmark to overcome cyber security attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 42 publications
0
9
0
Order By: Relevance
“…While there are several ways that bad actors obtain this information, prevention strategies all revolve around target hardening. This involves technology measures such as ensuring security systems have the latest patches for vulnerabilities, and staff and customer accounts use adequate security such as multifactor authentication (MFA) and strong password guidelines (Akram and Ping 2019;Lord 2020). It is also important to incorporate staff training in recognising phishing attempts and suspicious emails, awareness of social engineering techniques, and what processes should be followed in these situations (Jampen et al 2020;Lord 2020).…”
Section: Points Of Disruption/preventionmentioning
confidence: 99%
“…While there are several ways that bad actors obtain this information, prevention strategies all revolve around target hardening. This involves technology measures such as ensuring security systems have the latest patches for vulnerabilities, and staff and customer accounts use adequate security such as multifactor authentication (MFA) and strong password guidelines (Akram and Ping 2019;Lord 2020). It is also important to incorporate staff training in recognising phishing attempts and suspicious emails, awareness of social engineering techniques, and what processes should be followed in these situations (Jampen et al 2020;Lord 2020).…”
Section: Points Of Disruption/preventionmentioning
confidence: 99%
“…Do not open a file from an unknown sender and do not use the same password everywhere and do not keep a copy of plain text login [6]. Try not login into your accounts on a public network and always Enable Multi-Factor Authentication and do not give personal information by phone or email and do not visit a fishy website.…”
Section: Cyber Crime Preventionsmentioning
confidence: 99%
“…It is a very adaptive process in software development activities. Recently, many clone detection approaches have been developed, which detect code clones in different software systems. However, during the detection of clones, it is difficult to say which code fragment is original and which code fragment is copied.…”
Section: Introductionmentioning
confidence: 99%