Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: https://repository.hneu.edu.ua/handle/123456789/33611
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.authorLeroy I.-
dc.contributor.authorZolotaryova I.-
dc.date.accessioned2024-09-26T17:35:22Z-
dc.date.available2024-09-26T17:35:22Z-
dc.date.issued2023-
dc.identifier.citationLeroy I. Insights for Economic Security: Recovery Strategies from Cyber-Attacks / I. Leroy, I. Zolotaryova // The 13th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2023, Athens, Greece. – 2023.ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/33611-
dc.description.abstractThis article delves into strategies for businesses to bolster cybersecurity and mitigate financial losses post-cyber-attacks. It leverages Lean Six Sigma methodologies and data from past research on significant data breaches in US and EU stock markets. The study investigates the link between cyber-attacks and stock market dynamics, with a focus on reputation management. Gaussian distribution and Six Sigma methodology are used for probability analysis. Key findings underscore the significance of predictability, precision, and reputation management in cyber-risk mitigation. Effective reputation management reduces insurance costs and market share loss, while inadequate management results in higher expenses. The research introduces novel insights into safeguarding a company's value, reducing vulnerabilities, and advocating for Cyber Autonomy and reputation management to lower insurance premiums and enhance protective measures.ru_RU
dc.language.isoenru_RU
dc.subjectcyber securityru_RU
dc.subjectcyber autonomyru_RU
dc.subjectcritical infrastructureru_RU
dc.subjectcyber-attackru_RU
dc.subjectrisk mitigation strategyru_RU
dc.titleInsights for Economic Security: Recovery Strategies from Cyber-Attacksru_RU
dc.typeArticleru_RU
Розташовується у зібраннях:Статті (ІС)

Файли цього матеріалу:
Файл Опис РозмірФормат 
Zolotaryova (2).pdf87,67 kBAdobe PDFПереглянути/відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.