Search

2017 Cybersecurity predictions

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20170002666</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20170127091541.0</controlfield>
    <controlfield tag="008">170127s2017    usa||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">2017 Cybersecurity predictions</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">[New York]</subfield>
      <subfield code="b">Stroz Friedberg</subfield>
      <subfield code="c">2017</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The authors believe that the year 2017 will bring the intensification of longstanding trends that cybersecurity professionals today are vigilantly monitoring, while several new or enhanced challenges will present themselves in force. Further, threats already broadly recognized, such as the security risk inherently a part of IoT, social engineering as a criminal tactic of choice, and the ability of hackers to attack data and interrupt or compromise information sources, will intensify this year as exploit techniques become more cunning</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20100017982</subfield>
      <subfield code="a">Riesgos emergentes</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603731</subfield>
      <subfield code="a">Seguridad informática</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20090035270</subfield>
      <subfield code="a">Piratería</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20150010735</subfield>
      <subfield code="a">Internet de las cosas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603038</subfield>
      <subfield code="a">Prevención de riesgos</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20170000990</subfield>
      <subfield code="a">Stroz Friedberg</subfield>
    </datafield>
  </record>
</collection>