Добірка наукової літератури з теми "Kaspersky Internet Security"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Kaspersky Internet Security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Kaspersky Internet Security"

1

Priya, Aayushi, Kajol Singh, and Rajeev Tiwari. "A Review on Malware Analysis by using an Approach of Machine Learning Techniques." IJOSTHE 3, no. 5 (January 4, 2019): 5. http://dx.doi.org/10.24113/ojssports.v3i5.86.

Повний текст джерела
Анотація:
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed serious andevolving security threats to Internet users. To protect legitimate users from these threats, anti-malware softwareproducts from different companies, including Comodo, Kaspersky, Kingsoft, and Symantec, provide the majordefense against malware. Unfortunately, driven by the economic benefits, the number of new malware sampleshas explosively increased: anti-malware vendors are now confronted with millions of potential malware samplesper year. In order to keep on combating the increase in malware samples, there is an urgent need to developintelligent methods for effective and efficient malware detection from the real and large daily sample collection.One of the most common approaches in literature is using machine learning techniques, to automatically learnmodels and patterns behind such complexity, and to develop technologies to keep pace with malware evolution.This survey aims at providing an overview on the way machine learning has been used so far in the context ofmalware analysis in Windows environments. This paper gives an survey on the features related to malware filesor documents and what machine learning techniques they employ (i.e., what algorithm is used to process the inputand produce the output). Different issues and challenges are also discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Aguilar Antonio, Juan Manuel. "La brecha de ciberseguridad en América Latina frente al contexto global de ciberamenazas." Revista de Estudios en Seguridad Internacional 6, no. 2 (December 8, 2020): 17–43. http://dx.doi.org/10.18847/1.12.2.

Повний текст джерела
Анотація:
This research is based on the hypothesis that the governments of Latin America and the Caribbean are lagging behind in the construction of cyber defense capabilities to face the international context of cyber threats, with respect to the member countries of North Atlantic Treaty Organization (NATO), both in the organizational plan, as in the individual. To prove this statement, the text is divided into six sections. The first part presents the global environment of cyber threats, the economic losses suffered by governments and companies according to reports from information security firms such as Kaspersky, Microsoft, Verizon and International Business Machines Corporation (IBM). The second part presents the internet securitization process, the immersion of cybersecurity in national security studies, and the definition of cyber capabilities and the delimitation of threats to the Nation-State from cyberspace are addressed. The third part shows the trajectory of NATO as an organization in the development of cyber capabilities in the last twenty years. In the fourth part, a set of National Cybersecurity Strategies (ENCS) of NATO countries and allies is analyzed from the individual level, from which their main elements are extracted and their general anatomy is outlined. In the sixth part, an approach to different regional or global cybersecurity environments is presented based on measurements of the Global Cybersecurity Index (GCI), of the International Telecommunications Union (ITU), and the National Cyber Security Index (NSCI) of the Estonian E-Governance Academy. The fifth section presents the context of cybersecurity in Latin America and the Caribbean, according to studies made by the Inter-American Development Bank (IDB) and the Organization of American States (OAS), as well as private cybersecurity firms. In the sixth, two case studies of Mexico, from the 2019-2020, are briefly presented, which represent the lack of maturity of its ENCS and development of cyber capabilities, an aspect that it shares with most of the countries of Latin America and Caribbean. Finally, brief conclusions are presented on the aspects to be strengthened by the region.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Silva, Ricardo Leopoldo da, and Anderson Vieira. "Segurança Cibernética: O Cenário Dos Crimes Virtuais No Brasil." Revista Científica Multidisciplinar Núcleo do Conhecimento, April 20, 2021, 134–49. http://dx.doi.org/10.32749/nucleodoconhecimento.com.br/ciencia-da-computacao/crimes-virtuais.

Повний текст джерела
Анотація:
O presente artigo tem por finalidade introduzir o tema da segurança cibernética direcionado aos crimes virtuais de maior ocorrência no cenário brasileiro em decorrência da evolução e do aumento significativo da utilização de tecnologias da informação e comunicação – as chamadas TICs. No momento atual, são marcantes a presença e a utilização de tais tecnologias, onde é possível observar do acesso à conta de e-mail à realização de transações financeiras, além de múltiplas aplicações, serviços e negócios. Em consequência desse total envolvimento e, por conseguinte, da dependência das TICs, pessoas mal-intencionadas motivam-se ao desenvolvimento de ferramentas para exploração de vulnerabilidades, como também se beneficiam da imperícia, desatenção e inocência dos usuários, a fim de atingirem seus objetivos – seja a disseminação de infecções em dispositivos informáticos ou a obtenção de informações alheias nos âmbitos pessoal e financeiro. Por intermédio de uma comparação global, a pesquisa destaca os principais crimes virtuais de maior ocorrência no Brasil. Igualmente, mediante análise realizada em relatórios e security reports – disponibilizados na internet -, foi possível identificar as tecnologias de maior exploração, o comportamento e o modo como os ataques foram realizados. Ademais, este artigo expõe alguns conceitos referentes à segurança cibernética, apresentando diferentes definições, como a da Associação de Controle e Auditoria de Sistemas de Informação – organização global de profissionais de governança de TI, controle, segurança e auditoria – e, também, de empresas voltadas à segurança da informação, tais como a Norton by Symantec e a Kaspersky Lab. Da mesma forma, esclarece o aspecto jurídico em relação aos crimes virtuais, salientando a evolução da legislação brasileira para se adequar ao cenário atual, e, assim, aplicar de maneira correta as penalidades aos crimes informáticos. De modo final, explicita que somente investimentos em tecnologia e infraestrutura não são suficientes para a redução dos crimes virtuais; ressalta, consequentemente, que são necessários investimentos em educação e conscientização dos usuários para o melhor aproveitamento dos recursos tecnológicos disponíveis.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Kaspersky Internet Security"

1

Вервейко, В. В., та Д. В. Чеботарьова. "Аналіз видів захисту особистих даних використовуючи антивірусні програми". Thesis, ХНУРЕ, 2021. https://openarchive.nure.ua/handle/document/16490.

Повний текст джерела
Анотація:
The rapid development of information technology is gradually transforming the world. Open and free cyberspace expands the freedom and opportunities of people, enriches society. But there is a downside, which is the theft of personal data, extortion or valuable information. Having anti-virus programs on your personal computer can, if not prevent, severely prevent a fraudster from accessing information that is personal.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Kaspersky Internet Security"

1

Kasperskij, Evgenij V. Malware: Von Viren, Würmern, Hackern und Trojanern und wie man sich vor ihnen schützt ; [inkl. 90-Tage-Testversion Kaspersky Internet Security 7.0]. München: Hanser, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Kaspersky Internet Security"

1

Injac, Olivera, and Ramo Šendelj. "National Security Policy and Strategy and Cyber Security Risks." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 22–48. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8793-6.ch002.

Повний текст джерела
Анотація:
This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії