Cyber hygiene during Covid-19 to avoid cyber attacks
This project is a research study on cyber hygiene during COVID-19 to avoid cyber-attacks for academic purposes. Cyber security is crucial in today's cyber defence. Cyber security expenses have increased over the past decade while massive infringements of data and data leaks have also risen. In...
| Main Author: | Lee, Yvonne Yi Jin |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/4751/ http://eprints.utar.edu.my/4751/1/fyp_IB_2022_LYYJ.pdf |
Similar Items
Personality traits and cyber hygiene behavior among university students
by: Hew, Chi Wei
Published: (2020)
by: Hew, Chi Wei
Published: (2020)
The impact of Covid-19 to the Cyber Security and information society – experience of Malaysia = Dampak Covid-19 terhadap keamanan cyber dan masyarakat informasi – pengalaman Malaysia
by: Zulhuda, Sonny
Published: (2020)
by: Zulhuda, Sonny
Published: (2020)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Cyber-attack and reliability monitoring of the synchrophasor smart grid network
by: Yadav, Atul Kumar
Published: (2022)
by: Yadav, Atul Kumar
Published: (2022)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)
by: Ibrahim, Azmuddin
Published: (2009)
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019)
by: Mubarak, Sinil, et al.
Published: (2019)
Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries
by: Rahmand, Pedram, et al.
Published: (2010)
by: Rahmand, Pedram, et al.
Published: (2010)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
by: Thrupthi, C.P., et al.
Published: (2024)
by: Thrupthi, C.P., et al.
Published: (2024)
Cyber Safety in Malaysia
by: Soon , Seng Thah
Published: (2017)
by: Soon , Seng Thah
Published: (2017)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
A Prediction Algorithm to Enhance Grid Resilience Towards Cyber Attacks in WACS Applications
by: Musleh, M.A.S., et al.
Published: (2019)
by: Musleh, M.A.S., et al.
Published: (2019)
A Muslim’s guide to good hygiene practice during COVID-19
by: Aminudin, Rabi'ah
Published: (2020)
by: Aminudin, Rabi'ah
Published: (2020)
Cyber essentials for Nigerian business
by: Orunta, Nathaniel
Published: (2015)
by: Orunta, Nathaniel
Published: (2015)
Cyber laws and it-rich society
by: P.S. Sangal,
Published: (2001)
by: P.S. Sangal,
Published: (2001)
Semantics of Cyber-Physical Systems
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Cyber counselling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber- counseling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
The announcement of Dar al-Harb in cyber media in context of the theological policy of jihad: reading the cyber-jihad and ISIS based on the pharmakon characteristic of the cyber media
by: Erdem, Burcu Kaya, et al.
Published: (2017)
by: Erdem, Burcu Kaya, et al.
Published: (2017)
Concept and Practices of Cyber Supply Chain in Manufacturing Context
by: Gani, Anisha Banu Dawood, et al.
Published: (2018)
by: Gani, Anisha Banu Dawood, et al.
Published: (2018)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Defamation in the cyber age: the emerging trends
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
Down the cyber rabbit hole: whistleblowing as a means to fulfilling moral obligations in cyber space
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Similar Items
-
Personality traits and cyber hygiene behavior among university students
by: Hew, Chi Wei
Published: (2020) -
The impact of Covid-19 to the Cyber Security and information society – experience of Malaysia = Dampak Covid-19 terhadap keamanan cyber dan masyarakat informasi – pengalaman Malaysia
by: Zulhuda, Sonny
Published: (2020) -
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014) -
Cyber-attack and reliability monitoring of the synchrophasor smart grid network
by: Yadav, Atul Kumar
Published: (2022)