Information Technology--essential Yet Vulnerable
Title | Information Technology--essential Yet Vulnerable PDF eBook |
Author | United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations |
Publisher | |
Pages | 184 |
Release | 2002 |
Genre | Administrative agencies |
ISBN |
Essential Vulnerabilities
Title | Essential Vulnerabilities PDF eBook |
Author | Deborah Achtenberg |
Publisher | Northwestern University Press |
Pages | 225 |
Release | 2014-06-30 |
Genre | Philosophy |
ISBN | 0810129949 |
In Essential Vulnerabilities, Deborah Achtenberg contests Emmanuel Levinas’s idea that Plato is a philosopher of freedom for whom thought is a return to the self. Instead, Plato, like Levinas, is a philosopher of the other. Nonetheless, Achtenberg argues, Plato and Levinas are different. Though they share the view that human beings are essentially vulnerable and essentially in relation to others, they conceive human vulnerability and responsiveness differently. For Plato, when we see beautiful others, we are overwhelmed by the beauty of what is, by the vision of eternal form. For Levinas, we are disrupted by the newness, foreignness, or singularity of the other. The other, for him, is new or foreign, not eternal. The other is unknowable singularity. By showing these similarities and differences, Achtenberg resituates Plato in relation to Levinas and opens up two contrasting ways that self is essentially in relation to others.
Emerging Cyber Threats and Cognitive Vulnerabilities
Title | Emerging Cyber Threats and Cognitive Vulnerabilities PDF eBook |
Author | Vladlena Benson |
Publisher | Academic Press |
Pages | 254 |
Release | 2019-09-20 |
Genre | Psychology |
ISBN | 0128165944 |
Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals
Centers of Gravity & Critical Vulnerabilities
Title | Centers of Gravity & Critical Vulnerabilities PDF eBook |
Author | Joe Strange |
Publisher | |
Pages | 176 |
Release | 1996 |
Genre | Military art and science |
ISBN |
Innovative Technologies for Dependable OTS-Based Critical Systems
Title | Innovative Technologies for Dependable OTS-Based Critical Systems PDF eBook |
Author | Domenico Cotroneo |
Publisher | Springer Science & Business Media |
Pages | 213 |
Release | 2013-01-24 |
Genre | Computers |
ISBN | 8847027721 |
The demand for large-scale dependable, systems, such as Air Traffic Management, industrial plants and space systems, is attracting efforts of many word-leading European companies and SMEs in the area, and is expected to increase in the near future. The adoption of Off-The-Shelf (OTS) items plays a key role in such a scenario. OTS items allow mastering complexity and reducing costs and time-to-market; however, achieving these goals by ensuring dependability requirements at the same time is challenging. CRITICAL STEP project establishes a strategic collaboration between academic and industrial partners, and proposes a framework to support the development of dependable, OTS-based, critical systems. The book introduces methods and tools adopted by the critical systems industry, and surveys key achievements of the CRITICAL STEP project along four directions: fault injection tools, V&V of critical systems, runtime monitoring and evaluation techniques, and security assessment.
Critical Information Infrastructures Security
Title | Critical Information Infrastructures Security PDF eBook |
Author | Awais Rashid |
Publisher | Springer Nature |
Pages | 103 |
Release | 2020-08-26 |
Genre | Computers |
ISBN | 3030582957 |
Chapter “A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Critical Infrastructure
Title | Critical Infrastructure PDF eBook |
Author | Robert Radvanovsky |
Publisher | CRC Press |
Pages | 337 |
Release | 2006-05-22 |
Genre | Computers |
ISBN | 1420007424 |
Reporting on the significant strides made in securing and protecting our nation‘s infrastructures, this timely and accessible resource examines emergency responsiveness and other issues vital to national homeland security. Critical Infrastructure: Homeland Security and Emergency Preparedness details the important measures that have been tak