Advanced Searches
- Database: Computer Science Collection
- Boolean term: Cybersecurity and Cyberattacks
- Limiters: Academic Journals, Full-Text Documents, Peer-Reviewed Journals, Publication Date Apr 06,2017 – April 06, 2022.
- Results: 158
- Potential Article: Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159. Accessed April 6, 2022. https://link.gale.com/apps/doc/A698238142/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=05d816ca
- Annotation: Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159 Accessed April 6, 2022. https://link.gale.com/apps/doc/A698238142/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=05d816ca
- This article covers a survey containing 11 questions related to cybersecurity distributed to university students. Network security is based on your cybersecurity awareness. Security vulnerabilities pose a danger to organizations’ ability to circumvent cyber-attacks. The cybersecurity of the company is impacted by every individual who has a connection to the internet (Materials and Methods).
- Boolean term: Cybersecurity and Cyberattacks
- Database: Computer Science Collection
- Boolean Term: Cyberattacks not Cybercrime
- Limiters: Academic Journals, Full-Text Documents, Peer-Reviewed Journals, Publication Date Apr 06,2017 – April 06, 2022, subject: Data Security”.
- Results: 59
- Potential Article: Zrahia, Aviram. “Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views.” Journal of Cybersecurity, vol. 4, no. 1, Mar. 2018, pp. 1g+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4. Accessed 6 Apr. 2022.
-
- Annotation: Zrahia, Aviram. “Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views.” Journal of Cybersecurity, vol. 4, no. 1, Mar. 2018, pp. 1g+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4. Accessed 6 Apr. 2022. https://link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4
- This article covers sharing intelligence between security vendors becomes the means to overcome this catch-22 scenario (2) and could partially explain why sharing companies are ranked higher for innovation and success (Intro paragraph).
- Annotation: Zrahia, Aviram. “Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views.” Journal of Cybersecurity, vol. 4, no. 1, Mar. 2018, pp. 1g+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4. Accessed 6 Apr. 2022. https://link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4
- Database: Ebsco: Computer Source
- Boolean term: Computer Security or cybersecurity
- Limiters: Full Text, Peer-Reviewed, Publication Date 1/2018 – 12/22, Language: English, Publication: International Journal of Information Security
- Subject Terms: INTERNET security
CYBERTERRORISM
CYBER intelligence (Computer security)
SECURITIES analysts
INFORMATION visualization
COMPUTER crime prevention
INFORMATION technology security - Results: 59
- Potential Article: Schlette, D., Böhm, F., Caselli, M., & Pernul, G. (2021). Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20(1), 21–38. https://doi-org.ezproxy.fhsu.edu/10.1007/s10207-020-00490-y. Accessed April 6, 2022.
- Annotation: Schlette, D., Böhm, F., Caselli, M., & Pernul, G. (2021). Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20(1), 21–38. https://doi-org.ezproxy.fhsu.edu/10.1007/s10207-020-00490-y.
- This article covers the timely exchange of high-quality CTI is crucial for the effort of organizations to prevent cyber security breaches (Motivational Example).
mohamed_hassan / Pixabay
- This article covers the timely exchange of high-quality CTI is crucial for the effort of organizations to prevent cyber security breaches (Motivational Example).
- Boolean term: Computer Security or cybersecurity