Risk mitigation plan

Introduction Training people to adopt security-conscious behaviors and establishing policies for maintaining a secure environment go a long way towards improving an organization’s overall security posture. The next sections cover…

Comments Off on Risk mitigation plan

Ethical views on computer security

Computer LawsMansoor (2008) defined computer ethics as a category of professional ethics similar to medical, legal, teaching and accounting ethics. It is based on an individual’s behavior which on the…

Comments Off on Ethical views on computer security

The attack layer of cyber terrorism

Cyber terrorism is defined as those attacks that via computer networks can disable or disrupt computers and their networks causing serious material and/or economic damage and, possibly, loss of life.…

Comments Off on The attack layer of cyber terrorism