Please use this identifier to cite or link to this item: http://cris.utm.md/handle/5014/2112
Title: A differentiated beneficiary cybersecurity approach
Authors: BOLUN, Ion 
COJOCARU, Svetlana 
Keywords: cyber-attack;cybersecurity breache;criteria;cybercrime costs;categories of beneficiaries
Issue Date: 2022
Source: BOLUN, I., COJOCARU, S. A differentiated beneficiary cybersecurity approach. In: Proceedings of The 12th International Conference on Electronics, Communications and Computing ECCO-2022, October 20-21, 2022. Chisinau: UTM. https://ecco.utm.md/ecco22-track2/
Conference: International Conference on Electronics, Communications and Computing (IC|ECCO)
Abstract: 
The considerable losses caused by the low level of infospace’s cybersecurity and the limited financial resources available imply the need to found effective ways to improve the implementation of measures counteracting cyber-attacks. First, some aspects regarding the situation in the field are characterized, including: industries most targeted by cyber-attacks, common types of cyber-attacks, industries’ readiness to counteract cyberattacks, and causes of cybersecurity breaches. Reducing the costs with cybersecuring the beneficiaries may be achieved by typifying the solutions. For this purpose, criteria are selected and categories of beneficiaries are defined. Then the necessary actions for the differentiated cybersecurity (by categories) of beneficiaries are formulated.
URI: http://repository.utm.md/handle/5014/21840
http://cris.utm.md/handle/5014/2112
DOI: 10.52326/ic-ecco.2022/SEC.01
Appears in Collections:Proceedings Papers

Files in This Item:
File Description SizeFormat
Int-conf-ECCO-2022-p115-118.pdf477.31 kBAdobe PDFView/Open
Show full item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.