Pesquisa de referências

Mapping a path to cyber attribution consensus

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20210011146</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20210409110513.0</controlfield>
    <controlfield tag="008">171205e20210301che||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20200018698</subfield>
      <subfield code="a">Carter, Rachel Anne </subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="4">
      <subfield code="a">Mapping a path to cyber attribution consensus</subfield>
      <subfield code="c">Rachel Anne Carter, Julian Enoizi</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Zurich</subfield>
      <subfield code="b">The Geneva Association</subfield>
      <subfield code="b">IFTRIP</subfield>
      <subfield code="c">2021</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">36 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The rapid pace of digital transformation, accelerated by COVID-19, is driving increased demand for cyber risk protection. There are a number of ways in which cyber risk protection can be achieved which include a high level of cyber hygiene, implementing and investing in standards for cyber security, not merely in terms of initial security measures but also a strategy for maintaining and upgrading security. Insurance is one mechanism, which focuses on the economic protection of a business if it experiences a cyberattack. Even though insuring cyber risk is challenging, not least due to the potential for large accumulations of loss, insurance as part of a broader security strategy can reduce overall losses. It can encourage behaviour that promotes the robustness of online systems and incentivises good cyber hygiene. </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080552367</subfield>
      <subfield code="a">Reaseguro</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20170006435</subfield>
      <subfield code="a">Enoizi, Julian</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080445805</subfield>
      <subfield code="a">Embedded Finance & Super App Strategies</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20200018704</subfield>
      <subfield code="a">The International Forum of Terrorism Risk (Re)Insurance Pools</subfield>
    </datafield>
  </record>
</collection>