TITLE

Singapore security threat landscape still plagued by known issues

PUB. DATE
September 2015
SOURCE
eGov Innovation;9/2/2015, p1
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports on the information security threat in Singapore in terms of combating cybercrime through strategy, mitigation and legislation.
ACCESSION #
109282859

 

Related Articles

  • 2012 Prediction: The Year of FDSACC. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Jan2012, Vol. 49 Issue 1, p10 

    The article presents predictions for the 2012 Finally Doing Something About CyberCrime (FDSACC), which tackles the trend in cyber security in the U.S. It asserts that the Security 500 survey that was conducted in 2011 has shown that only 19% of Security 500 computer security officers (CSOs)...

  • Is it possible to make the internet-of-things secure? Bush, Steve // Electronics Weekly;2/19/2014, Issue 2577, p12 

    The article analyzes the security concerns associated with Internet-of-things (IoT) under the Internet protocol version 6 (IPv6). It is reported that, although the IoT has enabled people to do things like creating ad-hoc home automation on their phones, it has also created security concerns like...

  • Intelligence key to protecting data against fraud and espionage threats. Ashford, Warwick // Computer Weekly;11/22/2011, p7 

    The article focuses on the importance of information security in businesses as the value of information assets increase and threats from cyber crime rise. It asserts that many of the organisations' information security is not well integrated with the entire business, which either limits the...

  • Information Security Incidents Increase While Budgets Decrease. Violino, Bob // Insurancenetworking.com;10/ 2/2014, p1 

    The compound-annual-growth rate of detected security incidents has risen 66 percent year-over-year since 2009.

  • Information Security Incidents Increase, yet Budgets Decrease. Violino, Bob // Information-management.com;10/ 2/2014, p1 

    As breach incidents and the costs of managing and mitigating breaches increase year over year, global information security budgets decreased from 2013, according to a report from PwC, CIO and CSO

  • Design and Implementation of Comprehensive Security System for Access and Account Management in a Information System(NTIS-based). Jeong-Hyun Lee; Dong-gu Shin // Journal of Next Generation Information Technology;Oct2013, Vol. 4 Issue 8, p190 

    Hacking attempts or cyber attacks to information systems have recently evolved to be sophisticated and deadly, resulting in such incidents as leakage of personal information and system destruction. While various security solutions to cope with these risks are being developed and deployed, it is...

  • Key Trends in Information Security for 2015. Papineni, Ramsunder // Dataquest;12/31/2014, Vol. 32/33 Issue 24/1, p58 

    The article focuse son the important trends in the information security in 2015. Smart phones that hold data are of interest to hackers. Cyber insurance is to become an important part of cyber strategies with businesses seeking to marginalize the costs of a breach. The Cryptolocker malware is...

  • Key Trends in Information Security for 2015. Papineni, Ramsunder // PC Quest;Dec2014, p49 

    The article discusses the key trends and developments in information security in 2015. It forecasts the emergence of security concerns on mobile applications that can potentially cause devastating consequences. It notes the potential of Ransomware, a Cryptolocker malware, to become a more...

  • Another Ode to Paranoia. Laplante, Phil; DeFranco, Joanna // IT Professional;May/Jun2010, Vol. 12 Issue 3, p57 

    The article discusses the importance of defensive mechanisms against cyber terrorist attacks. It states that without any defensive layer, these attacks can deteriorate into a cyberpandemic, a situation when cyber intrusion causes limitless and widespread chaos. However, the effectiveness of any...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics