The Final Search

For my topic I am doing research on how cyber security involves with businesses. How having good security benefits with protecting your business. From data files, information and etc. and just want to expand on how cyber attacks try to breach data.

Search 1:

  • Terms-  Data Breach “AND” Data Privacy “OR” security
  • Results- 346
  • Database- Computer Source

THOMAS, L. et al. A framework for data privacy and security accountability in data breach communications. Computers & Security[s. l.], v. 116, p. N.PAG, 2022. DOI 10.1016/j.cose.2022.102657. Disponível em: https://search.ebscohost.com/login.aspx?direct=true&db=cph&AN=155961631&site=ehost-live&scope=site. Acesso em: 25 abr. 2022.

The possible impact of breaches on information system confidence is one implication. Individuals must have confidence that organizations will retain, distribute, and handle their personal data in an appropriate, ethical, and responsible manner . This is especially true because handing over such information is essential for many everyday activities. Individuals, on the other hand, are often unaware of what happens to their data once it is handed over, or whether an organization’s data management systems and processes are compliant with privacy and cyber security best practices.

Search 2:

  • Terms- Data “AND” Security “AND” Manangment
  • Results -17
  • Database- Computer Source

Saham, Ahbra. “DIFFERENT SECURE DATA DEDUPLICATION APPROACHES FOR CLOUD STORAGE: A REVIEW.” Computer Source, 6 June 2020, https://www.sciencedirect.com/science/article/pii/S1319157820305140.

Cloud storage service providers meet the needs of businesses and individuals by allowing them to store, transport, and backup ever-increasing amounts of data while also offering access to other cloud resources. Cloud service providers use the most extensively used deduplication approach to provide effective data storage since it enables for the storage of a single instance of data while removing duplicate copies, reducing storage overhead and upload bandwidth. Clients who upload data to the cloud are most concerned about the data’s security, integrity, privacy, and confidentiality.
Search 3:
  • Terms- Cybersecurity “Or” Cyber Attacks ” AND”  security
  • Results-146
  • Database- Computer Source

Sedjelmaci, Hichem, et al. “A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks.” IEEE Transactions on Systems, Man & Cybernetics. Systems, vol. 48, no. 9, Sept. 2018, pp. 1594–606. EBSCOhost, https://doi.org/10.1109/TSMC.2017.2681698.

Networks of unmanned aerial vehicles (UAVs) have received little study interest. Security issues, in particular, are a key worry because such networks, which transmit sensitive data, are vulnerable to a variety of attacks. In this research, we propose and implement a unique intrusion detection and response technique that detects malicious anomalies that endanger the network at the UAV and ground station levels. According to the discovered cyber-attack, a set of detection and response approaches are proposed in this scheme to monitor UAV actions and categorize them into the appropriate list (normal, abnormal, suspect, and malicious).

Search 4:

  • Terms- Cybersecurity “AND” Business Intelligence
  • Results-210
  • Database- Computer Source

Whitney, Jamie. “The Essentials of Trusted Computing and Cyber Security.” Military & Aerospace Electronics, vol. 31, no. 12, Dec. 2020, pp. 14–21. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=147745934&site=ehost-live&scope=site.

The article explains how the United States’ military and government information security professionals plan to defend against determined hackers attempting to break into crucial computing systems belonging to foreign nations and businesses. The thoughts of Dave Imbordino, the National Security Agency’s election security lead, on ransomware, indictments relating to China’s harmful cyber activity, and the Department of Defense’s new National Cyber Strategy are among the topics highlighted.

Search 5:

  • Terms- Cyber attack “AND” Business security
  • Results- 402
  • Database- Computer Source

Goodwin, Bill. “Cyber Security Failure Is among Top Risks for Countries and Businesses, Says WEF: Cyber Security Is among the Top Five Risks Facing Organisations and Governments in the next Two to Five Years, with Digital Inequality and the Overcrowding of Space with Communication Satellites as Further Risks.” Computer Weekly, Jan. 2022, pp. 4–6. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=cph&AN=154783808&site=ehost-live&scope=site.

The topic of the article is As governments battle with climate change, growing social inequality, and recovery from the pandemic, the World Economic Forum (WEF) cautions that cyber security threats are among the top hazards facing the world. As corporate leaders, politicians, academics, and non-government organizations convene in a series of virtual dialogues, one of the primary dangers under discussion will be the increased susceptibility of governments and corporations to cyber attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *