Cyber threat intelligence: (Record no. 46950)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01541nam a22002057a 4500 |
001 - CONTROL NUMBER | |
control field | 46950 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240422140300.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240422b |||||||| |||| 00| 0 eng d |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | OOSTHOEK Kris |
245 ## - TITLE STATEMENT | |
Title | Cyber threat intelligence: |
Remainder of title | a product without a process?/ |
Statement of responsibility, etc. | Kris Oosthoek and Christian Doerr |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Date of publication, distribution, etc. | 2021 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cyber threats have become a permanent threat to society. Over the last few years, accounts of hacking campaigns into public- and private-sector enterprises have drawn significant attention. In 2017, Yahoo announced that three billion user account details were exposed in a hacking operation dating back to 2013. In 2018, Equifax disclosed that malicious actors had penetrated its corporate network and exposed sensitive personal data of 143 million U.S. citizens. The same year, Marriott Hotels declared that the records of 383 million guests were exposed to malicious actors. These breaches descended from state-coordinated hacking campaigns. Cybersecurity breaches cause technical catastrophes, but also have significant ramifications at economic, legal, and individual and personal levels. |
598 ## - BULLETIN HEADING | |
Bulletin Heading | CYBER THREAT, CYBERSECURITY, NEWARTICLS |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | CYBER THREAT |
General subdivision | CYBER SECURITY |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | DOERR Christian |
773 ## - HOST ITEM ENTRY | |
Related parts | International Journal of Intelligence and Counterintelligence, Volume 34, Number 2, Summer 2021, page: 300-315 |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062">https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062</a> |
Public note | Click here for full text |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Journal Article |
Suppress in OPAC | No |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Mindef Library & Info Centre | Mindef Library & Info Centre | Journals | 22/04/2024 | CYBER THREAT | 22/04/2024 | 22/04/2024 | Journal Article |