Abstract

Governments have been snooping on information systems in foreign countries and in their own. However, that's only part of a greater problem. The threat of cyberattacks from a variety of sources violates confidentiality and can cause the theft, abuse, manipulation, or destruction of information. But instead of narrowly focusing on a specific type of threat, the authors advise a well‐considered program: understand the actual risks, develop an overall information security strategy, and implement advanced and persistent defenses against cyberattacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call