[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Falch et al., 2023 - Google Patents

Cybersecurity Strategies for SMEs in the Nordic Baltic Region

Falch et al., 2023

View PDF
Document ID
16575898742959170427
Author
Falch M
Olesen H
Skouby K
Tadayoni R
Williams I
Publication year
Publication venue
Journal of Cyber Security and Mobility

External Links

Snippet

Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the world. The topic of this paper is how SMEs in the Nordic Baltic Region should face this challenge. Possible technical and organisational tasks …
Continue reading at vbn.aau.dk (PDF) (other versions)

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E10/00Energy generation through renewable energy sources
    • Y02E10/20Hydro energy
    • Y02E10/22Conventional, e.g. with dams, turbines and waterwheels
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BINDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B60/00Information and communication technologies [ICT] aiming at the reduction of own energy use
    • Y02B60/30Techniques for reducing energy-consumption in wire-line communication networks
    • Y02B60/33Techniques for reducing energy-consumption in wire-line communication networks by selective link activation in bundled links

Similar Documents

Publication Publication Date Title
Gibson et al. Managing risk in information systems
Death Information security handbook: develop a threat model and incident response strategy to build a strong information security framework
Falch et al. Cybersecurity Strategies for SMEs in the Nordic Baltic Region
Calder A business guide to information security: how to protect your company's IT assets, reduce risks and understand the law
Chapple et al. CompTIA security+ study guide: exam SY0-601
Mishra Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition)
Jackson Network security auditing
Watters Cybercrime and Cybersecurity
Lichtenstein et al. Effective management and policy in e-business security
Ozkaya Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
Falch et al. Cybersecurity in SMEs in the Baltic Sea Region
Nawa Developing a cybersecurity framework for the banking sector of Namibia
Konar et al. Understanding the Relationship Between Trust and Faith in Micro-Enterprises to Cyber Hygiene: An Empirical Review
Nur Cybersecurity awareness in Somalia
Agbede Incident Handling and Response Process in Security Operations
Calderon et al. Toward a Protocol for Tax Data Security
Mugwagwa et al. Cybersecurity strategy: future proof cybersecurity for small to medium enterprises in South Africa
Kambourakis et al. Information security in the age of EU-Institutions digitalisation, a landscape analysis
Falch et al. 2.1 Hacker Types and Incentives
Özyazıcı Building a security operations center with an enhanced cyber intelligence capability
Paleczek Navigating Cybersecurity Challenges: Analysing cyber threats and protective strategies for SMEs
Reuvid The Secure Online Business Handbook: e-commerce, IT functionality & business continuity
Bruce The Effectiveness of Data Security in Africa: A Research Study of Kenya
Haugland Assessment of security threats and risks in supply chains
Aslaner Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques