The FORTIKA Accelerated Edge Solution for Automating SMEs Security

River Publishers eBooks(2022)

引用 0|浏览2
暂无评分
摘要
Although the recent trend for the term “cyber-attack” is restricted for incidents causing physical damage, it has been traditionally used to describe a broader range of attempts to make unauthorized use of an asset related to computer information systems, computer networks, or even personal computing devices. As such, a cyber-attack aims to steal, alter a targets’ system/data, or even destroy targets by gaining access into a targeted system. In this respect, a whole new industry has been shaped around the need for protection against cyber-attacks, i.e. the “cyber-security” domain, which primarily deals with the protection of systems (incl. HW/SW & data) connected to the internet against cyber-attacks and should not be necessarily mixed with the domain of Information Technology (IT) Security (see Figure 4.1) that mainly refers to the protection of information. Cyber-security, on the other hand, is the ability to protect or defend the use of cyberspace from cyber-attacks by securing “things”, vulnerable through ICT. Figure 4.1 Information technology security vs cyber-security. https://s3-euw1-ap-pe-df-pch-content-public-p.s3.eu-west-1.amazonaws.com/9781003337492/51cb024d-c0f0-4f03-818e-5915e5d0ef18/content/fig4_1.tif" xmlns:xlink="https://www.w3.org/1999/xlink"/>
更多
查看译文
关键词
smes security,fortika accelerated edge solution
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要