20+years of cyber (in)security: what have we seen? what have we learned? what might we do?
Rich PethiaPublished in: CSIIRW (2010)
Keyphrases
- cyber security
- cyber defense
- cyber crime
- information security
- cyber attacks
- information assurance
- cyber physical systems
- security issues
- security policies
- identity theft
- years ago
- risk analysis
- intrusion detection
- situation awareness
- security systems
- data security
- security problems
- security level
- critical infrastructure
- database
- computer security
- network security
- access control
- authentication protocol
- functional requirements
- security threats
- security management
- security requirements
- security measures
- statistical databases
- intrusion detection system