Evaluation techniques for cyber threats in network management systems
Source:IT4Sec Reports, Number 151 (2023)
Keywords:cyber threats, identification/assessment techniques, network management systems
In a world where people are completely dependent on computer technology and information systems, the protection of information is of critical importance. The study presents an overview of some popular solutions for technical assessment of cyber threats in a risky, "sensitive" information environment, namely network management systems.