Gaining Access with Social Engineering: An Empirical Study of the Threat | 2007/12/13 | English | 55 |
The Impact of Virus Attack Announcements on the Market Value of Firms | 2004/05/01 | English | 45 |
Awareness Education as the Key to Ransomware Prevention | 2007/09/04 | English | 31 |
The Financial Impact of IT Security Breaches: What Do Investors Think? | 2003/03/01 | English | 31 |
Secure Coding: Building Security into the Software Development Life Cycle | 2004/11/01 | English | 25 |
On the Anatomy of Human Hacking | 2007/12/13 | English | 23 |
Implementing an Information Security Awareness Program | 2005/05/01 | English | 21 |
Designing a Security Awareness Program: Part 1 | 2001/01/01 | English | 20 |
Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues | 2000/07/01 | English | 17 |
Do Information Security Professionals and Business Managers View Information Security Issues Differently? | 2007/01/01 | English | 15 |
The Effects of Outsourcing on Information Security | 2001/05/01 | English | 14 |
The Good and Not So Good of Enforcing Password Composition Rules | 2007/03/28 | English | 13 |
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times | 2006/12/01 | English | 13 |
Security for Enterprise Resource Planning Systems | 2007/06/12 | English | 11 |
Information Security Policy Development and Implementation | 2007/11/20 | English | 11 |
Information Security Policy Framework: Best Practices for Security Policy in the E-commerce Age | 2001/05/01 | English | 11 |
Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security | 2002/09/01 | English | 11 |
An Introduction to Insider Threat Management | 2007/03/28 | English | 9 |
Risk Analysis and Risk Management | 2004/09/01 | English | 8 |
Recognizing and Preparing Loss Estimates from Cyber-Attacks | 2004/01/01 | English | 8 |
Managing RFID Consumer Privacy and Implementation Barriers | 2007/09/04 | English | 7 |
IT Security Management and Business Process Automation: Challenges, Approaches, and Rewards | 2007/01/01 | English | 7 |
An Introduction to Social Engineering | 2000/10/01 | English | 6 |
Metatagging and Trademark Law: Brookfield Communications, Inc. v. West Coast Entertainment Corp. | 2001/03/01 | English | 6 |
Desktop Security and Usability Trade-Offs: An Evaluation of Password Management Systems | 2005/05/01 | English | 6 |
Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO Must Ask Each Other | 2007/11/20 | English | 6 |
Calendar 1992 | 1992/01/01 | English | 5 |
Security Through Deception | 2007/03/28 | English | 5 |
A Guide to Selecting and Implementing Security Controls | 1994/01/01 | English | 5 |
Penetration Testing Through Social Engineering | 1996/01/01 | English | 5 |