Improving Cybersecurity for E-commerce Expansion: A Case Study of GoGreen
VerifiedAdded on 2023/04/26
|13
|2724
|409
AI Summary
In this report we will discuss about computer & system security and below are the summaries point:-
The paper evaluates aspects of GoGreen, an e-commerce business dealing with organic products.
The objective is to identify areas for improvement for business expansion and proper cyber security implementation.
Threats identified include external attacks on the organization's system, data breaches, and lack of employee awareness.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: COMOUTER AND SYSTEM SECURITY
COMOUTER AND SYSTEM SECURITY
Name of the Student:
Name of the University:
Author Note:
COMOUTER AND SYSTEM SECURITY
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
COMOUTER AND SYSTEM SECURITY
Table of Contents
Introduction......................................................................................................................................2
Part 1: Threat Identification.............................................................................................................2
Part 2: Business Constraints............................................................................................................3
Part 3: Human Constraints...............................................................................................................5
Part 4: Risk identification................................................................................................................6
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
COMOUTER AND SYSTEM SECURITY
Table of Contents
Introduction......................................................................................................................................2
Part 1: Threat Identification.............................................................................................................2
Part 2: Business Constraints............................................................................................................3
Part 3: Human Constraints...............................................................................................................5
Part 4: Risk identification................................................................................................................6
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
2
COMOUTER AND SYSTEM SECURITY
Introduction
GoGreen is an e-commerce company that deals with online selling of the organic
products. The organic products are mainly food diets and food grains. This online e-commerce
organization is operating locally and has the dedicated consumer base. The current employees of
the organization is 20. On the basis of the turnover of the business, the management of the
organization is thinking to expand the business outside the locality. In order to do this certain
technical improvisations are needed to be done in the organization system. Apart from that
GoGreen needs to assure the cyber security implemented properly in the system, as the whole
system is operated through online. The main objective of this paper is to evaluate the different
aspects GoGreen and identify the areas for the improvement for the expansion of the business.
The operations related to the information technology in the organization are-
Stock of the products: The existing stocks of products and quantities.
Customers: Transaction details, details of consumers.
Employees: Personal details of the employees along with their work records.
Stakeholders: Suppliers of the stocks, contracts and accounting information.
The existing operating system in the organization are-
Database for managing the stocks of the products.
Website for e-commerce business.
Online payment gateway
The security measures taken by the organization are-
COMOUTER AND SYSTEM SECURITY
Introduction
GoGreen is an e-commerce company that deals with online selling of the organic
products. The organic products are mainly food diets and food grains. This online e-commerce
organization is operating locally and has the dedicated consumer base. The current employees of
the organization is 20. On the basis of the turnover of the business, the management of the
organization is thinking to expand the business outside the locality. In order to do this certain
technical improvisations are needed to be done in the organization system. Apart from that
GoGreen needs to assure the cyber security implemented properly in the system, as the whole
system is operated through online. The main objective of this paper is to evaluate the different
aspects GoGreen and identify the areas for the improvement for the expansion of the business.
The operations related to the information technology in the organization are-
Stock of the products: The existing stocks of products and quantities.
Customers: Transaction details, details of consumers.
Employees: Personal details of the employees along with their work records.
Stakeholders: Suppliers of the stocks, contracts and accounting information.
The existing operating system in the organization are-
Database for managing the stocks of the products.
Website for e-commerce business.
Online payment gateway
The security measures taken by the organization are-
3
COMOUTER AND SYSTEM SECURITY
Firewall
Use of VPN
Use of anti-virus software
Accounts for employees and the users.
Part 1: Threat Identification
Identification and description of threat:
The GoGreen is conducting the sales through online and the payment is received via
online payment gateway (Cavusoglu et al., 2015). In this situation, the security is the main
concern for the organization. Maintaining the security of the organization includes saving and
managing the data of the organization and the users stored in the system server (Martinez 2018).
Apart from that the organization has to assure the users that the payment gateway is safe and
secure. Moreover, the systems in the organization have to be protected from the external threats.
Some of the identified threats are-
External attacks in the systems of GoGreen:
External attacks such as malware attack and ransom ware attacks can be occur to the
systems of the organization (Aguenza and Som 2018). As the whole functionality of GoGreen is
dependent on the online activities, it is possible that these types of attacks affect the server.
These kind of attack can become the constraint for daily functioning of the organization.
COMOUTER AND SYSTEM SECURITY
Firewall
Use of VPN
Use of anti-virus software
Accounts for employees and the users.
Part 1: Threat Identification
Identification and description of threat:
The GoGreen is conducting the sales through online and the payment is received via
online payment gateway (Cavusoglu et al., 2015). In this situation, the security is the main
concern for the organization. Maintaining the security of the organization includes saving and
managing the data of the organization and the users stored in the system server (Martinez 2018).
Apart from that the organization has to assure the users that the payment gateway is safe and
secure. Moreover, the systems in the organization have to be protected from the external threats.
Some of the identified threats are-
External attacks in the systems of GoGreen:
External attacks such as malware attack and ransom ware attacks can be occur to the
systems of the organization (Aguenza and Som 2018). As the whole functionality of GoGreen is
dependent on the online activities, it is possible that these types of attacks affect the server.
These kind of attack can become the constraint for daily functioning of the organization.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
COMOUTER AND SYSTEM SECURITY
Unauthorized access:
The system or the portal of GoGreen can be accessed by unauthorized persons. In that
case, there is a chance that the business process of the GoGreen can be misguided.
Vulnerabilities and attacks:
Vulnerabilities and attacks can be defined as the sudden attacks in the system of the
organization and process of doing business of GoGreen. Possible vulnerabilities and the attacks
for GoGreen are-
Lack of security at payment gateway:
The payment system for GoGreen is online. In order to conduct the online payment,
payment gateway is required. There can be lack of security at payment gateway. The lack of
security at payment gate way can breach information regarding the card details and personal
information of the individual consumers.
Mitigation technique:
The organization has taken some of the steps in order to mitigate the security threats.
GoGreen has implemented the firewall and anti-virus in the systems of the organization. Apart
from that the database used by GoGreen has been encrypted so that it can be protected from the
unauthorized users. The authorized person can access the database through the application of
username and password,.
COMOUTER AND SYSTEM SECURITY
Unauthorized access:
The system or the portal of GoGreen can be accessed by unauthorized persons. In that
case, there is a chance that the business process of the GoGreen can be misguided.
Vulnerabilities and attacks:
Vulnerabilities and attacks can be defined as the sudden attacks in the system of the
organization and process of doing business of GoGreen. Possible vulnerabilities and the attacks
for GoGreen are-
Lack of security at payment gateway:
The payment system for GoGreen is online. In order to conduct the online payment,
payment gateway is required. There can be lack of security at payment gateway. The lack of
security at payment gate way can breach information regarding the card details and personal
information of the individual consumers.
Mitigation technique:
The organization has taken some of the steps in order to mitigate the security threats.
GoGreen has implemented the firewall and anti-virus in the systems of the organization. Apart
from that the database used by GoGreen has been encrypted so that it can be protected from the
unauthorized users. The authorized person can access the database through the application of
username and password,.
5
COMOUTER AND SYSTEM SECURITY
Part 2: Business Constraints
Personnel constraints:
Personnel constraints in the organization can be defined as the problems with the human
resources in the organization. The human resource management is important for GoGreen as it
helps to conduct the business in a proper way. Personnel constraint can be considered as one of
the factor in the business constraints. The possible personal constraints present in GoGreen are-
Number of employees:
The current number of employees in the organization is 20. This number is enough for
managing the all existing consumers. However, the company is growing and expanding its
business. In this situation, the number of employees is needed to be increased. The recruitment of
the employees should be based on the requirements of the organization. GoGreen needs more
technical experts for the implementation of the advanced technology in order to conduct the
online business.
Lack of experts:
The entire business of the organization is managed over the online platform. In this case,
expert employees are needed for managing the servers and the systems along with maintaining
COMOUTER AND SYSTEM SECURITY
Part 2: Business Constraints
Personnel constraints:
Personnel constraints in the organization can be defined as the problems with the human
resources in the organization. The human resource management is important for GoGreen as it
helps to conduct the business in a proper way. Personnel constraint can be considered as one of
the factor in the business constraints. The possible personal constraints present in GoGreen are-
Number of employees:
The current number of employees in the organization is 20. This number is enough for
managing the all existing consumers. However, the company is growing and expanding its
business. In this situation, the number of employees is needed to be increased. The recruitment of
the employees should be based on the requirements of the organization. GoGreen needs more
technical experts for the implementation of the advanced technology in order to conduct the
online business.
Lack of experts:
The entire business of the organization is managed over the online platform. In this case,
expert employees are needed for managing the servers and the systems along with maintaining
6
COMOUTER AND SYSTEM SECURITY
the security of the system (Stanley and Morgan 2015). It has been seen that there is a lack of
expert employees for managing and handling the systems used at GoGreen.
Other cost constraints:
Cost constraints can be defined as the lack of financial resources for the implementation
of the new system (Ismaili-Alaoui et al.2018). GoGreen has faced some of the cost constraints
during the implementation of the firewall in the system and implementing the encryption in the
database (Lee, Pacheco and Newell 2018). As there is a lack of security experts in the
organization, these security measures have been outsourced to the third organization. This
outsourcing was expensive in this case.
Mitigation plan:
The organization is planning to recruit more technical experts in order to merge the gap
in the present and required human resource for the organization. Apart from that the company is
thinking to provide training to the employees so that they can get familiar with the newly
implemented system.
Part 3: Human Constraints
Human Factors:
Human factors can be defined by the motivation and indulgence of the individual
employees at the work (Lee, Pacheco and Newell 2018). The behavior of the individual
employees in the organization is dependent on the leadership style in the organization and the
level of motivation for the individuals. For the GoGreen some possible human constraints are-
COMOUTER AND SYSTEM SECURITY
the security of the system (Stanley and Morgan 2015). It has been seen that there is a lack of
expert employees for managing and handling the systems used at GoGreen.
Other cost constraints:
Cost constraints can be defined as the lack of financial resources for the implementation
of the new system (Ismaili-Alaoui et al.2018). GoGreen has faced some of the cost constraints
during the implementation of the firewall in the system and implementing the encryption in the
database (Lee, Pacheco and Newell 2018). As there is a lack of security experts in the
organization, these security measures have been outsourced to the third organization. This
outsourcing was expensive in this case.
Mitigation plan:
The organization is planning to recruit more technical experts in order to merge the gap
in the present and required human resource for the organization. Apart from that the company is
thinking to provide training to the employees so that they can get familiar with the newly
implemented system.
Part 3: Human Constraints
Human Factors:
Human factors can be defined by the motivation and indulgence of the individual
employees at the work (Lee, Pacheco and Newell 2018). The behavior of the individual
employees in the organization is dependent on the leadership style in the organization and the
level of motivation for the individuals. For the GoGreen some possible human constraints are-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
COMOUTER AND SYSTEM SECURITY
Absence of proper management hierarchy:
In this organization, there is no well-defined organizational structure or management
hierarchy (Luiijf 2016). In this situation, the employees in the organization can feel confused
about discussing the problems and issues at the workplace. Apart from that this also leads to the
lack of clarity in the information provided to them (Tounsi and Rais 2018). Moreover, there are
no written guidelines for using and operating this online based business. This can lead to the
unethical practice y some of the employees in the organization.
Personnel:
Absence of objective:
There is no well-defined organization objective in front of the employees. Apart from
that there is no leader to manage the employees of the organization (Lee, Pacheco and Newell
2018). The lack of predefined objectives and absence of proper leader and guidance can make
the employees de-motivated to carry on their own role in the organization (Reinsberg 2017). This
can hamper the productivity and the sales percentage of the products can be decreased.
Inadequate chances for the career growth:
Most of the employees at GoGreen feel that they have limited chances for the career
growth in this organization (Galli 2018). This affects their self-esteem and basic needs for the
indulgence into the work. The lack of motivation for the employees can hamper the working
culture of the organization. The employees of the organization think that the growth of the career
COMOUTER AND SYSTEM SECURITY
Absence of proper management hierarchy:
In this organization, there is no well-defined organizational structure or management
hierarchy (Luiijf 2016). In this situation, the employees in the organization can feel confused
about discussing the problems and issues at the workplace. Apart from that this also leads to the
lack of clarity in the information provided to them (Tounsi and Rais 2018). Moreover, there are
no written guidelines for using and operating this online based business. This can lead to the
unethical practice y some of the employees in the organization.
Personnel:
Absence of objective:
There is no well-defined organization objective in front of the employees. Apart from
that there is no leader to manage the employees of the organization (Lee, Pacheco and Newell
2018). The lack of predefined objectives and absence of proper leader and guidance can make
the employees de-motivated to carry on their own role in the organization (Reinsberg 2017). This
can hamper the productivity and the sales percentage of the products can be decreased.
Inadequate chances for the career growth:
Most of the employees at GoGreen feel that they have limited chances for the career
growth in this organization (Galli 2018). This affects their self-esteem and basic needs for the
indulgence into the work. The lack of motivation for the employees can hamper the working
culture of the organization. The employees of the organization think that the growth of the career
8
COMOUTER AND SYSTEM SECURITY
is not sufficient for them in this organization. Apart from that according to some of the
employees the organization is not providing the proper opportunities to develop new skills.
Limited chances of career growth de-motivate the employees in the organization.
Mitigation plan:
The authority of this organization is planning to create the managerial hierarchy in the
organization so that the employees can identify the person to approach for the solving of the
problems.
Part 4: Risk identification
Risk 1: Security constraints
Identification of risk: The identified risks in this field are security attacks in the
systems of GoGreen and lack of security in the payment gateway.
Discussion of measuring risk: The whole system and the business of the organization is
operating through online (Galli 2018). In this case, there is a chance that violation of the
online securities can be occurred in the system. The attack can intrude into the system
through malicious link or from the malicious online resources (Lee, Pacheco and Newell
2018). The site of the organization can be hacked (Galli 2019). In this situation there is a
chance that the stored data in the website and the database of the organization can be
breached. This will become a threat to the consumers of the organization as well the
GoGreen itself.
Another identified risk in the system is lack of security at the payment gateway.
The online transaction of the system is done through the payment gateway (Kopnina
2017). While making the payment for the organization, user has to enter the valid card
COMOUTER AND SYSTEM SECURITY
is not sufficient for them in this organization. Apart from that according to some of the
employees the organization is not providing the proper opportunities to develop new skills.
Limited chances of career growth de-motivate the employees in the organization.
Mitigation plan:
The authority of this organization is planning to create the managerial hierarchy in the
organization so that the employees can identify the person to approach for the solving of the
problems.
Part 4: Risk identification
Risk 1: Security constraints
Identification of risk: The identified risks in this field are security attacks in the
systems of GoGreen and lack of security in the payment gateway.
Discussion of measuring risk: The whole system and the business of the organization is
operating through online (Galli 2018). In this case, there is a chance that violation of the
online securities can be occurred in the system. The attack can intrude into the system
through malicious link or from the malicious online resources (Lee, Pacheco and Newell
2018). The site of the organization can be hacked (Galli 2019). In this situation there is a
chance that the stored data in the website and the database of the organization can be
breached. This will become a threat to the consumers of the organization as well the
GoGreen itself.
Another identified risk in the system is lack of security at the payment gateway.
The online transaction of the system is done through the payment gateway (Kopnina
2017). While making the payment for the organization, user has to enter the valid card
9
COMOUTER AND SYSTEM SECURITY
number along with the security pin for the transaction (Stanley and Morgan 2015). If the
security is not properly implemented at the payment gateway, there is a chance that the
breaching of the information of the card and the user details can occur. This situation is
not desirable for both the company and the users.
Risk 2: Lack of expert people
Identification of risk: The identified risk in this field is about the lack of expert
people in the organization.
Discussion of measuring risk: The current strength of employees in the
organization is 23. All the employees in the organization are efficient enough for
handling the existing system. However, for the expansion of the business and
implementation of the security planning in the organization needs the expert handling
(Biermann 2017). It has been seen that the organization does not have sufficient amount
of technical experts for the implementation of the security and technical implementation.
Risk 3: Managing the employees
Identification of risk: The identified risk in this field is the lack of leadership and
the managerial hierarchy in the organization.
Discussion of measuring risk: There is a lack of managerial hierarchy for the
organization. In this situation, the employees in the organization get confused while
discussing the problems and issues at the workplace (Roy and Mazumdar 2018). There is
no defined post for the authorities. The employees feel there is a lack of leadership and
proper guidance. Apart from that there is absence of organizational objective along with
COMOUTER AND SYSTEM SECURITY
number along with the security pin for the transaction (Stanley and Morgan 2015). If the
security is not properly implemented at the payment gateway, there is a chance that the
breaching of the information of the card and the user details can occur. This situation is
not desirable for both the company and the users.
Risk 2: Lack of expert people
Identification of risk: The identified risk in this field is about the lack of expert
people in the organization.
Discussion of measuring risk: The current strength of employees in the
organization is 23. All the employees in the organization are efficient enough for
handling the existing system. However, for the expansion of the business and
implementation of the security planning in the organization needs the expert handling
(Biermann 2017). It has been seen that the organization does not have sufficient amount
of technical experts for the implementation of the security and technical implementation.
Risk 3: Managing the employees
Identification of risk: The identified risk in this field is the lack of leadership and
the managerial hierarchy in the organization.
Discussion of measuring risk: There is a lack of managerial hierarchy for the
organization. In this situation, the employees in the organization get confused while
discussing the problems and issues at the workplace (Roy and Mazumdar 2018). There is
no defined post for the authorities. The employees feel there is a lack of leadership and
proper guidance. Apart from that there is absence of organizational objective along with
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
COMOUTER AND SYSTEM SECURITY
long and short term goals. All these factors can de-motivate the employees of GoGreen
to complete their work properly.
Mitigation plan:
The company is thinking to present the opportunities and the options those are available
for the employees of the company. However, this action can be taken only after the development
of the proper managerial structure for the organization.
Conclusion
The discussion is regarding the different constraints and the risks present in GoGreen. It
can be said that this evaluation can help GoGreen to identify the problems in the business. The
identification of the problems and the business will help GoGreen to expand the business in a
proper way. It has been seen that identified problems and challenges in the organization can be
categorized into technical and non-technical level. The technical issues are regarding the security
of the organization. On the other hand the non-technical issues are regarding the managing of the
human resource and recruitment of technical experts. It has been seen that GoGreen is lacking
the proper managerial hierarchy and leadership.
COMOUTER AND SYSTEM SECURITY
long and short term goals. All these factors can de-motivate the employees of GoGreen
to complete their work properly.
Mitigation plan:
The company is thinking to present the opportunities and the options those are available
for the employees of the company. However, this action can be taken only after the development
of the proper managerial structure for the organization.
Conclusion
The discussion is regarding the different constraints and the risks present in GoGreen. It
can be said that this evaluation can help GoGreen to identify the problems in the business. The
identification of the problems and the business will help GoGreen to expand the business in a
proper way. It has been seen that identified problems and challenges in the organization can be
categorized into technical and non-technical level. The technical issues are regarding the security
of the organization. On the other hand the non-technical issues are regarding the managing of the
human resource and recruitment of technical experts. It has been seen that GoGreen is lacking
the proper managerial hierarchy and leadership.
11
COMOUTER AND SYSTEM SECURITY
References
Aguenza, B.B. and Som, A.P.M., 2018. Motivational factors of employee retention and
engagement in organizations. IJAME.
Biermann, F., 2017. A World Environment Organization: solution or threat for effective
international environmental governance?. Routledge.
Cavusoglu, H., Cavusoglu, H., Son, J.Y. and Benbasat, I., 2015. Institutional pressures in
security management: Direct and indirect influences on organizational investment in information
security control resources. Information & Management, 52(4), pp.385-400.
Galli, B.J., 2018. The Lessons of Human Resource in The Theory of Constraints. International
Journal of Organizational and Collective Intelligence (IJOCI), 8(1), pp.13-27.
Galli, B.J., 2019. How Can Human Resource Management Help the Theory of
Constraints. International Journal of Strategic Engineering (IJoSE), 2(1), pp.1-13.
Ismaili-Alaoui, A., Baïna, K., Benali, K. and Baïna, J., 2018, June. Towards Smart Incident
Management Under Human Resource Constraints for an IoT-BPM Hybrid Architecture.
In International Conference on Web Services (pp. 457-471). Springer, Cham.
Kopnina, H., 2017. Working with human nature to achieve sustainability: Exploring constraints
and opportunities. Journal of Cleaner Production, 148, pp.751-759.
Lee, I.C., Pacheco, M.M. and Newell, K.M., 2018. Constraints specific influences of vision,
touch and surface compliance in postural dynamics. Gait & posture, 59, pp.117-121.
COMOUTER AND SYSTEM SECURITY
References
Aguenza, B.B. and Som, A.P.M., 2018. Motivational factors of employee retention and
engagement in organizations. IJAME.
Biermann, F., 2017. A World Environment Organization: solution or threat for effective
international environmental governance?. Routledge.
Cavusoglu, H., Cavusoglu, H., Son, J.Y. and Benbasat, I., 2015. Institutional pressures in
security management: Direct and indirect influences on organizational investment in information
security control resources. Information & Management, 52(4), pp.385-400.
Galli, B.J., 2018. The Lessons of Human Resource in The Theory of Constraints. International
Journal of Organizational and Collective Intelligence (IJOCI), 8(1), pp.13-27.
Galli, B.J., 2019. How Can Human Resource Management Help the Theory of
Constraints. International Journal of Strategic Engineering (IJoSE), 2(1), pp.1-13.
Ismaili-Alaoui, A., Baïna, K., Benali, K. and Baïna, J., 2018, June. Towards Smart Incident
Management Under Human Resource Constraints for an IoT-BPM Hybrid Architecture.
In International Conference on Web Services (pp. 457-471). Springer, Cham.
Kopnina, H., 2017. Working with human nature to achieve sustainability: Exploring constraints
and opportunities. Journal of Cleaner Production, 148, pp.751-759.
Lee, I.C., Pacheco, M.M. and Newell, K.M., 2018. Constraints specific influences of vision,
touch and surface compliance in postural dynamics. Gait & posture, 59, pp.117-121.
12
COMOUTER AND SYSTEM SECURITY
Luiijf, E., 2016. Threats in industrial control systems. In Cyber-security of SCADA and Other
Industrial Control Systems (pp. 69-93). Springer, Cham.
Martinez, M., 2018. Working with Constraints: The Merit of Prudence.
Reinsberg, B., 2017. Trust funds as a lever of influence at international development
organizations. Global Policy, 8, pp.85-95.
Roy, P. and Mazumdar, C., 2018, January. Modeling of Insider Threat using Enterprise Automaton.
In 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT) (pp. 1-
4). IEEE.
Stanley, R.M. and Morgan, C.E., 2015, September. The Concept Maturity Framework: A
Symbiotic Relationship between Human Factors Values and Systems Engineering Constraints.
In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 59, No. 1,
pp. 1736-1740). Sage CA: Los Angeles, CA: SAGE Publications.
Tounsi, W. and Rais, H., 2018. A survey on technical threat intelligence in the age of
sophisticated cyber attacks. Computers & security, 72, pp.212-233.
COMOUTER AND SYSTEM SECURITY
Luiijf, E., 2016. Threats in industrial control systems. In Cyber-security of SCADA and Other
Industrial Control Systems (pp. 69-93). Springer, Cham.
Martinez, M., 2018. Working with Constraints: The Merit of Prudence.
Reinsberg, B., 2017. Trust funds as a lever of influence at international development
organizations. Global Policy, 8, pp.85-95.
Roy, P. and Mazumdar, C., 2018, January. Modeling of Insider Threat using Enterprise Automaton.
In 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT) (pp. 1-
4). IEEE.
Stanley, R.M. and Morgan, C.E., 2015, September. The Concept Maturity Framework: A
Symbiotic Relationship between Human Factors Values and Systems Engineering Constraints.
In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 59, No. 1,
pp. 1736-1740). Sage CA: Los Angeles, CA: SAGE Publications.
Tounsi, W. and Rais, H., 2018. A survey on technical threat intelligence in the age of
sophisticated cyber attacks. Computers & security, 72, pp.212-233.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.