Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri May 2021

Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri

Publications

As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.


Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran Jan 2021

Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran

Scholarship and Professional Work - Business

There are many advantages to adopt cloud computing, however, some important issues need to be addressed, such as cybersecurity, cost-saving, trust, implementation complexity, and cloud provider’s reliability. This study developed a research framework to study the human factors that interact with technical and cybersecurity factors to affect the cloud-computing provider’s performance from the user’s perspective. Research hypotheses were developed and a survey was conducted to test the hypotheses and validate the research framework.


Learning From Digital Failures? The Effectiveness Of Firms’ Divestiture And Management Turnover Responses To Data Breaches, Gui-Deng Say, Gurneeta Vasudeva Jun 2020

Learning From Digital Failures? The Effectiveness Of Firms’ Divestiture And Management Turnover Responses To Data Breaches, Gui-Deng Say, Gurneeta Vasudeva

Research Collection Lee Kong Chian School Of Business

We examine whether firms learn from digital technology failures in the form of data breach events, based on the effectiveness of their failure responses. We argue that firms experiencing such technological failures interpret them broadly as organizational problems, and undertake unrelated divestitures and top management turnover to achieve better standardization and to remove dysfunctional routines. We test our hypotheses on unrelated subsidiary divestitures and chief technology officer (CTO) turnovers undertaken by 8,760 publicly traded U.S. firms that were at risk of experiencing data breaches in- volving the loss of personally identifiable information during the period 2005–2016. We find that data …