Please use this identifier to cite or link to this item:
http://cris.utm.md/handle/5014/2112
Title: | A differentiated beneficiary cybersecurity approach | Authors: | BOLUN, Ion COJOCARU, Svetlana |
Keywords: | cyber-attack;cybersecurity breache;criteria;cybercrime costs;categories of beneficiaries | Issue Date: | 2022 | Source: | BOLUN, I., COJOCARU, S. A differentiated beneficiary cybersecurity approach. In: Proceedings of The 12th International Conference on Electronics, Communications and Computing ECCO-2022, October 20-21, 2022. Chisinau: UTM. https://ecco.utm.md/ecco22-track2/ | Conference: | International Conference on Electronics, Communications and Computing (IC|ECCO) | Abstract: | The considerable losses caused by the low level of infospace’s cybersecurity and the limited financial resources available imply the need to found effective ways to improve the implementation of measures counteracting cyber-attacks. First, some aspects regarding the situation in the field are characterized, including: industries most targeted by cyber-attacks, common types of cyber-attacks, industries’ readiness to counteract cyberattacks, and causes of cybersecurity breaches. Reducing the costs with cybersecuring the beneficiaries may be achieved by typifying the solutions. For this purpose, criteria are selected and categories of beneficiaries are defined. Then the necessary actions for the differentiated cybersecurity (by categories) of beneficiaries are formulated. |
URI: | http://repository.utm.md/handle/5014/21840 http://cris.utm.md/handle/5014/2112 |
DOI: | 10.52326/ic-ecco.2022/SEC.01 |
Appears in Collections: | Proceedings Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Int-conf-ECCO-2022-p115-118.pdf | 477.31 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.