Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence.
Gurvirender P. TejaySean M. ZadigPublished in: HICSS (2012)
Keyphrases
- countermeasures
- information security
- security measures
- cyber attacks
- cyber defense
- defense mechanisms
- java card
- sql injection
- security issues
- cyber crime
- security breaches
- intrusion detection
- security requirements
- cyber security
- power analysis
- network security
- rural areas
- computer security
- information systems
- e government
- information warfare
- smart card
- information technology
- databases
- risk analysis
- identity theft
- sensitive data