Refine Your Search

Search Results

Viewing 1 to 2 of 2
Book

Cybersecurity for Entrepreneurs

2023-05-30
One data breach can close a small business before it even gets going. With all that is involved in starting a new business, cybersecurity can easily be overlooked but no one can afford to put it on the back burner. Cybersecurity for Entrepreneurs is the perfect book for anyone considering a new business venture. Written by cybersecurity experts from industry and academia, this book serves as an all-inclusive reference to build a baseline of cybersecurity knowledge for every small business. Authors Gloria D’Anna and Zachary A. Collier bring a fresh approach to cybersecurity using a conversational tone and a friendly character, Peter the Salesman, who stumbles into all the situations that this book teaches readers to avoid. Cybersecurity for Entrepreneurs includes securing communications, protecting financial transactions, safeguarding IoT devices, understanding cyber laws, managing risks, and assessing how much to invest in cyber security based on specific business needs.
Journal Article

A Semi-Quantitative Risk Assessment Standard for Counterfeit Electronics Detection

2014-09-01
2014-01-9002
Counterfeit electronic components entering into critical infrastructure and applications through the global supply chain threaten the economy and national security. In response to the growing threat from counterfeits, the Society of Automotive Engineers G-19 Committee is developing AS6171. This aerospace standard is focused on testing facilities with a goal of standardizing the process of counterfeit detection. An integral part of the standard is a semi-quantitative risk assessment method. This method assigns risk scores to electronic components based on a number of relevant criteria, and places the components into one of five risk tier levels corresponding to an appropriate level of laboratory testing to ensure the authenticity of the component. In this way, the methodology aims at standardizing the risk assessment process and bases the identified risk as guidance for commensurate testing protocols.
X