Cyber attacks : the best defense is a good offense.
(eVideo)
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Physical Desc
1 online resource (1 video file, approximately 22 min.) : digital, .flv file, sound
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Format
eVideo
Language
English
Notes
General Note
Title from title frames.
Date/Time and Place of Event
Originally produced by SmartPros in 2012.
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of cyber-attacks and how they have evolved and changed over the past several years. Identify the latest methods being used by attackers to breach the security of systems and networks. Explain best practices that will help organizations reduce the risk of a successful cyber-attack.
System Details
Mode of access: World Wide Web.
Citations
APA Citation, 7th Edition (style guide)
(2014). Cyber attacks: the best defense is a good offense . Kanopy Streaming.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2014. Cyber Attacks: The Best Defense Is a Good Offense. Kanopy Streaming.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Cyber Attacks: The Best Defense Is a Good Offense Kanopy Streaming, 2014.
MLA Citation, 9th Edition (style guide)Cyber Attacks: The Best Defense Is a Good Offense Kanopy Streaming, 2014.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
02bc60d9-7579-ba2b-0aa0-272d8e02f368-eng
Grouping Information
Grouped Work ID | 02bc60d9-7579-ba2b-0aa0-272d8e02f368-eng |
---|---|
Full title | cyber attacks the best defense is a good offense |
Author | kanopy |
Grouping Category | movie |
Last Update | 2022-07-15 10:37:41AM |
Last Indexed | 2024-04-27 02:17:52AM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Sep 19, 2022 |
Last Used | Nov 23, 2023 |
Marc Record
First Detected | Apr 21, 2022 11:44:06 AM |
---|---|
Last File Modification Time | Jul 15, 2022 10:40:43 AM |
MARC Record
LEADER | 02223ngm a22003851i 4500 | ||
---|---|---|---|
001 | kan1089885 | ||
003 | CaSfKAN | ||
005 | 20140204133419.0 | ||
006 | m o c | ||
007 | vz uzazuu | ||
007 | cr una---unuuu | ||
008 | 140807p20142012cau021 o vleng d | ||
028 | 5 | 2 | |a 1089885|b Kanopy |
035 | |a (OCoLC)897770049 | ||
040 | |a UtOrBLW|b eng|e rda|c UtOrBLW | ||
245 | 0 | 0 | |a Cyber attacks :|b the best defense is a good offense. |
264 | 1 | |a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2014. | |
300 | |a 1 online resource (1 video file, approximately 22 min.) :|b digital, .flv file, sound | ||
336 | |a two-dimensional moving image|2 rdacontent | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
344 | |a digital | ||
347 | |a video file|b MPEG-4|b Flash | ||
500 | |a Title from title frames. | ||
518 | |a Originally produced by SmartPros in 2012. | ||
520 | |a External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of cyber-attacks and how they have evolved and changed over the past several years. Identify the latest methods being used by attackers to breach the security of systems and networks. Explain best practices that will help organizations reduce the risk of a successful cyber-attack. | ||
538 | |a Mode of access: World Wide Web. | ||
650 | 0 | |a Business enterprises|x Computer networks|x Security measures. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Economics. | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Computer crimes. | |
710 | 2 | |a Kanopy (Firm) | |
856 | 4 | 0 | |u https://cityofgoleta.kanopy.com/node/89886|z A Kanopy streaming video |
856 | 4 | 2 | |z Cover Image|u https://www.kanopy.com/node/89886/external-image |