Cyber Security Articles

Database- Computer Source

  • keyword- cybersecurity
  • results-   3,237

Potential Article

E Silva, K. K. (k.k.esilva@uvt.nl). “Vigilantism and Cooperative Criminal Justice: Is There a Place for Cybersecurity Vigilantes in Cybercrime Fighting?” Mar. 2018, https://web.p.ebscohost.com/ehost/detail/detail?vid=5&sid=b6247cdf-74da-4210-80c4-8485bc1a17df%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=128454595&db=cph.

  • keyword- cybercrime
  • results-  3,512

Potential article

Wall*, DavidS. (d.s.wall@leeds.ac.uk). “Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime.” Computer Source, 2008, https://web.p.ebscohost.com/ehost/detail/detail?vid=7&sid=b6247cdf-74da-4210-80c4-8485bc1a17df%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=31747788&db=cph.

  • keyword- Risk management
  • results- 5,320

Potential Article

XINXIN FAN, et al. “Decentralized Trust Management: Risk Analysis and Trust Aggregation.” Computer Source, Feb. 2020, https://web.p.ebscohost.com/ehost/detail/detail?vid=9&sid=b6247cdf-74da-4210-80c4-8485bc1a17df%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=141670876&db=cph.

Database- Computer Science Collection
  • keyword- Malware
  • results- 1,123

Potential Article

“Malwarebytes offers anti-malware detection, prevention product.” Computer News Middle East, 18 Sept. 2012. Gale OneFile: Computer Sciencelink.gale.com/apps/doc/A302627784/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=6b559b3a. Accessed 31 Mar. 2022.

 

  • keyword- Firewall
  • results- 2,366

Potential Article

Babbs, Andrea. “Solving the Security Challenges of the Modern Work Environment with a Human Firewall.” Database and Network Journal, vol. 52, no. 1, Feb. 2022, p. 11. Gale OneFile: Computer Sciencelink.gale.com/apps/doc/A697577785/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=cf4f909b. Accessed 31 Mar. 2022.
  • keyword- data security
  • results- 3,421

Potential Article

Kline, Kevin. “Advanced Data Security Using Azure Defender for SQL.” Database Trends & Applications, vol. 35, no. 5, Oct.-Nov. 2021, pp. 28+. Gale OneFile: Computer Sciencelink.gale.com/apps/doc/A687157657/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=15e7bee0. Accessed 31 Mar. 2022.

 

Article:

Threats and risks abound in the world of data professionals and DBAs, and the perils are increasing. You’re presumably used to working with your identity management administration to govern and establish your user authentication system, and you’re definitely used to using long-standing database capabilities to secure your databases, such as roles and permissions. Advanced Data Security is a package of tools for assessing, detecting, categorizing, and analyzing SQL Server data and threats. If you’re an Azure user, keep in mind that Advanced Data Security capabilities are a separate, paid service from Azure SQL. Advanced Threat Detection, Data Discovery and Classification, and Vulnerability Assessment are the three different elements of Advanced Data Security.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *