dc.contributor.author | BOLUN, Ion | |
dc.contributor.author | COJOCARU, Svetlana | |
dc.date.accessioned | 2022-12-27T15:48:08Z | |
dc.date.available | 2022-12-27T15:48:08Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | BOLUN, Ion, COJOCARU, Svetlana. A Differentiated Beneficiary Cybersecurity Approach. In: Electronics, Communications and Computing (IC ECCO-2022): 12th intern. conf., 20-21 Oct. 2022, Chişinău, Republica Moldova: conf. proc., Chişinău, 2022, pp. 115-118. | en_US |
dc.identifier.uri | https://doi.org/10.52326/ic-ecco.2022/SEC.01 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/21840 | |
dc.description.abstract | The considerable losses caused by the low level of infospace’s cybersecurity and the limited financial resources available imply the need to found effective ways to improve the implementation of measures counteracting cyber-attacks. First, some aspects regarding the situation in the field are characterized, including: industries most targeted by cyber-attacks, common types of cyber-attacks, industries’ readiness to counteract cyber-attacks, and causes of cybersecurity breaches. Reducing the costs with cyber-securing the beneficiaries may be achieved by typifying the solutions. For this purpose, criteria are selected and categories of beneficiaries are defined. Then the necessary actions for the differentiated cybersecurity (by categories) of beneficiaries are formulated. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Technical University of Moldova | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | cyber-attacks | en_US |
dc.subject | cybersecurity breache | en_US |
dc.subject | cybercrime costs | en_US |
dc.title | A Differentiated Beneficiary Cybersecurity Approach | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: