Database- Computer Source
- keyword- cybersecurity
- results- 3,237
Potential Article
E Silva, K. K. (k.k.esilva@uvt.nl). “Vigilantism and Cooperative Criminal Justice: Is There a Place for Cybersecurity Vigilantes in Cybercrime Fighting?” Mar. 2018, https://web.p.ebscohost.com/ehost/detail/detail?vid=5&sid=b6247cdf-74da-4210-80c4-8485bc1a17df%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=128454595&db=cph.
- keyword- cybercrime
- results- 3,512
Potential article
Wall*, DavidS. (d.s.wall@leeds.ac.uk). “Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime.” Computer Source, 2008, https://web.p.ebscohost.com/ehost/detail/detail?vid=7&sid=b6247cdf-74da-4210-80c4-8485bc1a17df%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=31747788&db=cph.
- keyword- Risk management
- results- 5,320
Potential Article
XINXIN FAN, et al. “Decentralized Trust Management: Risk Analysis and Trust Aggregation.” Computer Source, Feb. 2020, https://web.p.ebscohost.com/ehost/detail/detail?vid=9&sid=b6247cdf-74da-4210-80c4-8485bc1a17df%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=141670876&db=cph.
- keyword- Malware
- results- 1,123
Potential Article
“Malwarebytes offers anti-malware detection, prevention product.” Computer News Middle East, 18 Sept. 2012. Gale OneFile: Computer Science, link.gale.com/apps/doc/A302627784/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=6b559b3a. Accessed 31 Mar. 2022.
- keyword- Firewall
- results- 2,366
Potential Article
- keyword- data security
- results- 3,421
Potential Article
Kline, Kevin. “Advanced Data Security Using Azure Defender for SQL.” Database Trends & Applications, vol. 35, no. 5, Oct.-Nov. 2021, pp. 28+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A687157657/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=15e7bee0. Accessed 31 Mar. 2022.
Article:
Threats and risks abound in the world of data professionals and DBAs, and the perils are increasing. You’re presumably used to working with your identity management administration to govern and establish your user authentication system, and you’re definitely used to using long-standing database capabilities to secure your databases, such as roles and permissions. Advanced Data Security is a package of tools for assessing, detecting, categorizing, and analyzing SQL Server data and threats. If you’re an Azure user, keep in mind that Advanced Data Security capabilities are a separate, paid service from Azure SQL. Advanced Threat Detection, Data Discovery and Classification, and Vulnerability Assessment are the three different elements of Advanced Data Security.