Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал:
https://repository.hneu.edu.ua/handle/123456789/33611
Повний запис метаданих
Поле DC | Значення | Мова |
---|---|---|
dc.contributor.author | Leroy I. | - |
dc.contributor.author | Zolotaryova I. | - |
dc.date.accessioned | 2024-09-26T17:35:22Z | - |
dc.date.available | 2024-09-26T17:35:22Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Leroy I. Insights for Economic Security: Recovery Strategies from Cyber-Attacks / I. Leroy, I. Zolotaryova // The 13th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2023, Athens, Greece. – 2023. | ru_RU |
dc.identifier.uri | http://repository.hneu.edu.ua/handle/123456789/33611 | - |
dc.description.abstract | This article delves into strategies for businesses to bolster cybersecurity and mitigate financial losses post-cyber-attacks. It leverages Lean Six Sigma methodologies and data from past research on significant data breaches in US and EU stock markets. The study investigates the link between cyber-attacks and stock market dynamics, with a focus on reputation management. Gaussian distribution and Six Sigma methodology are used for probability analysis. Key findings underscore the significance of predictability, precision, and reputation management in cyber-risk mitigation. Effective reputation management reduces insurance costs and market share loss, while inadequate management results in higher expenses. The research introduces novel insights into safeguarding a company's value, reducing vulnerabilities, and advocating for Cyber Autonomy and reputation management to lower insurance premiums and enhance protective measures. | ru_RU |
dc.language.iso | en | ru_RU |
dc.subject | cyber security | ru_RU |
dc.subject | cyber autonomy | ru_RU |
dc.subject | critical infrastructure | ru_RU |
dc.subject | cyber-attack | ru_RU |
dc.subject | risk mitigation strategy | ru_RU |
dc.title | Insights for Economic Security: Recovery Strategies from Cyber-Attacks | ru_RU |
dc.type | Article | ru_RU |
Розташовується у зібраннях: | Статті (ІС) |
Файли цього матеріалу:
Файл | Опис | Розмір | Формат | |
---|---|---|---|---|
Zolotaryova (2).pdf | 87,67 kB | Adobe PDF | Переглянути/відкрити |
Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.