The Q-Z of cyber security
Tools
Renaud, Karen (2024) The Q-Z of cyber security. Network Security, 2024 (4). ISSN 1353-4858 (https://doi.org/10.12968/s1353-4858(24)70013-0)
Preview |
Text.
Filename: Renaud-etal-NS-2024-The-Q-Z-of-cyber-security.pdf
Accepted Author Manuscript License: Strathprints license 1.0 Download (1MB)| Preview |
Abstract
I have gained inspiration from the Human Factors in Diving community to start an 'A-Z of cyber security’.1 Last time, we did M-P; in this column, I'm wrapping up the series with the remaining letters, with appropriate topics. Q & X - Questions & the uneXpected: In cyber security, and in the era of generational AI, we should always question our assumptions, and this applies to defenders as well as all other employees.
ORCID iDs
Renaud, Karen
-
-
Item type: Article ID code: 89258 Dates: DateEvent1 April 2024Published24 February 2024AcceptedNotes: This document is the Accepted Manuscript version of a Published Work that appeared in final form in Network Security, copyright © MA Healthcare, after peer review and technical editing by the publisher. To access the final edited and published work see https://doi.org/10.12968/S1353-4858(24)70013-0. Subjects: Science > Mathematics > Electronic computers. Computer science > Other topics, A-Z > Human-computer interaction Department: Faculty of Science > Computer and Information Sciences Depositing user: Pure Administrator Date deposited: 16 May 2024 15:53 Last modified: 19 Feb 2025 05:14 URI: https://strathprints.strath.ac.uk/id/eprint/89258
CORE (COnnecting REpositories)