TITLE

ISACA CYBERSECURITY NEXUS TOOLS HELP CYBER PROS

PUB. DATE
February 2016
SOURCE
Computer Security Update;Feb2016, Vol. 17 Issue 2, p1
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the launch of two Cybersecurity Nexus (CSX) tools by the Information System Audit and Control Association (ISACA) such as the Cybersecurity Career Road Map and the Threats and Controls. Topics discussed include the benefits offered by the tool to job seekers, the top three cyber threats in 2016 including social engineering, advanced persistent threats, and insider threats, and other threats in cybersecurity such as cybercrime, Malware, and watering hole.
ACCESSION #
112625230

 

Related Articles

  • Untitled. Harley, David // Computer Weekly;10/12/2010, p70 

    The article presents the author's comments on the use of fake anti-malware and other utilities by cyber criminal gangs. The author refers to a scam in which people are cold-called by a support desk where staffers claim Microsoft Corp.'s affiliation or accreditation. According to him, social...

  • Security takes SaaS route. Ashford, Warwick // Computer Weekly;5/5/2009, p10 

    The article discusses the increasing capacities of cybercriminals and the possible arrangement of Information Technology (IT) security. Criminals are reportedly striking with enhanced speed, using sophisticated social engineering techniques to lure users into installing malware. Worsening the...

  • Correlating messages from multiple IM networks to identify digital forensic artifacts. Yasin, Muhammmad; Kausar, Firdous; Aleisa, Eisa; Kim, Jongsung // Electronic Commerce Research;Nov2014, Vol. 14 Issue 3, p369 

    In recent years the usage of instant messaging (IM) has increased manifold. Recent reports show that law enforcement organizations are making requests for instant messaging information as a result of involvement in criminal activity. There can be multiple reasons for investigation of instant...

  • Fake Antivirus Extortion Set to Grow in 2009.  // Software World;Jan2009, Vol. 40 Issue 1, p22 

    The article reports that fake antivirus extortion is predicted to increase in 2009. According to ESET, volume and sophistication of hackers' attempts to extort money from end users in return for fake anti-malware are expected to grow in 2009 as cyber criminals increase the level of their social...

  • Botnet Bust-Up. Wolfe, Daniel; Quittner, Jeremy // American Banker;4/20/2011, Vol. 176 Issue 61, p5 

    Brief information is given about why the U.S. Justice Department issued a temporary restraining order to shut down the Coreflood malware botnet that steals computer data.

  • Help Unwanted. Quittner, Jeremy // American Banker;2/2/2011, Vol. 176 Issue 18, p5 

    Brief information is given about the discovery of Zeus Trojan malware in e-mails responding to job listings which could steal banking passwords and log-in information, according to the Internet Crime Complaint Center.

  • Self-Serve Malware. Wolfe, Daniel // American Banker;8/3/2011, Vol. 176 Issue 119, p7 

    The article presents brief information about malware identified by German police that affects computers with Windows operating systems and manipulates users into initiating online transfers of money from their bank accounts.

  • Dark Facebook a reality.  // Enterprise Innovation;Oct/Nov2010, Vol. 6 Issue 5, p9 

    The article reports on the suggestion of Massachusetts Institute of Technology (MIT) researchers and authors of "Stealing Reality" regarding the ability of malware to launch social engineering attacks based on the analysis of the behavioral patterns and social interactions of victim.

  • Open this malware or I'll sue you.  // Network World;9/26/2011, Vol. 28 Issue 17, p8 

    The article focuses on the malware in which a social engineering has used trickery to let the victims open email attachments with malware.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics