Home data security decisions
<p>The most common solution to securing data in the home remains <em>increased awareness</em>. However, studies and increasing numbers of cyberattacks targeting the home point to very limited success of this intervention. Awareness campaigns can lead to information overload, do not...
المؤلف الرئيسي: | Nthala, N |
---|---|
مؤلفون آخرون: | Flechais, I |
التنسيق: | أطروحة |
اللغة: | English |
منشور في: |
2019
|
الموضوعات: |
مواد مشابهة
-
How Can Secure Software be Trusted?
حسب: Lynn Futcher, وآخرون
منشور في: (2011-11-01) -
Analysis of information security technologies for use in the enterprise infrastructure
حسب: A. D. Popov, وآخرون
منشور في: (2023-02-01) -
Methodological and implementation aspects of introducing secure software development processes
حسب: Sas S. Arustamyan, وآخرون
منشور في: (2023-05-01) -
Systematic Mapping Study on Security Approaches in Secure Software Engineering
حسب: Rafiq Ahmad Khan, وآخرون
منشور في: (2021-01-01) -
Exploring How to Apply Secure Software Design Principles
حسب: Shouki A. Ebad
منشور في: (2022-01-01)