The Q-Z of cyber security
Tools
Renaud, Karen (2024) The Q-Z of cyber security. Network Security, 2024 (4). ISSN 1353-4858 (https://doi.org/10.12968/s1353-4858(24)70013-0)
Preview |
Text.
Filename: Renaud-etal-NS-2024-The-Q-Z-of-cyber-security.pdf
Accepted Author Manuscript License: Strathprints license 1.0 Download (1MB)| Preview |
Abstract
I have gained inspiration from the Human Factors in Diving community to start an 'A-Z of cyber security’.1 Last time, we did M-P; in this column, I'm wrapping up the series with the remaining letters, with appropriate topics. Q & X - Questions & the uneXpected: In cyber security, and in the era of generational AI, we should always question our assumptions, and this applies to defenders as well as all other employees.
ORCID iDs
Renaud, Karen ORCID: https://orcid.org/0000-0002-7187-6531;-
-
Item type: Article ID code: 89258 Dates: DateEvent1 April 2024Published24 February 2024AcceptedNotes: This document is the Accepted Manuscript version of a Published Work that appeared in final form in Network Security, copyright © MA Healthcare, after peer review and technical editing by the publisher. To access the final edited and published work see https://doi.org/10.12968/S1353-4858(24)70013-0. Subjects: Science > Mathematics > Electronic computers. Computer science > Other topics, A-Z > Human-computer interaction Department: Faculty of Science > Computer and Information Sciences Depositing user: Pure Administrator Date deposited: 16 May 2024 15:53 Last modified: 14 Nov 2024 13:49 URI: https://strathprints.strath.ac.uk/id/eprint/89258
CORE (COnnecting REpositories)