How Are Czech Individuals Willing to Protect Themselves: A Comparison of Cyber and Physical Realms
Endpoint users are usually viewed as the highest-risk element in the field of cybersecurity. At the same time, they need to be protected not just from the individual-level prism but also, from the states perspective, to counter threats like botnets that harvest weakly secured endpoints and forge an...
Main Authors: | Jan Kleiner, Jakub Drmola, Miroslav Mares |
---|---|
Format: | Article |
Language: | English |
Published: |
NASK National Research Institute
2022-12-01
|
Series: | Applied Cybersecurity & Internet Governance |
Subjects: | |
Online Access: | http://acigjournal.com/gicid/01.3001.0016.1322 |
Similar Items
-
CyberTOMP: A Novel Systematic Framework to Manage Asset-Focused Cybersecurity From Tactical and Operational Levels
by: Manuel Dominguez-Dorado, et al.
Published: (2022-01-01) -
Design and Implementation of Multi-Cyber Range for Cyber Training and Testing
by: Moosung Park, et al.
Published: (2022-12-01) -
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems
by: Georgios Kavallieratos, et al.
Published: (2021-03-01) -
Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems
by: Namhla Mtukushe, et al.
Published: (2023-07-01) -
Cyber Trust Index: A Framework for Rating and Improving Cybersecurity Performance
by: Sasawat Malaivongs, et al.
Published: (2022-11-01)