z-logo
Premium
Hackers, Snoopers, and Thieves: How to Handle the Latest Threats
Author(s) -
Cytryn Allan,
Beck Eric,
Ross Steven
Publication year - 2014
Publication title -
journal of corporate accounting and finance
Language(s) - English
Resource type - Journals
eISSN - 1097-0053
pISSN - 1044-8136
DOI - 10.1002/jcaf.21972
Subject(s) - hacker , confidentiality , variety (cybernetics) , computer security , internet privacy , business , computer science , artificial intelligence
Governments have been snooping on information systems in foreign countries and in their own. However, that's only part of a greater problem. The threat of cyberattacks from a variety of sources violates confidentiality and can cause the theft, abuse, manipulation, or destruction of information. But instead of narrowly focusing on a specific type of threat, the authors advise a well‐considered program: understand the actual risks, develop an overall information security strategy, and implement advanced and persistent defenses against cyberattacks.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here