Skip to page navigation menu
Skip entire header
Brown.edu
News
—
Events
—
Exhibits
—
For You
Undergraduate Students
Graduate & Medical Students
Faculty
Medical & Clinical Faculty
Alumni
Visiting Scholars
Special Collections Researchers
Library Staff
Brown Digital Repository
Off-Campus Access
My Library Account
Search
⚲
☰
×
BruKnow
Library Website
Search →
×
Feedback
Discover
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Search
Off-Campus Access
My Library Account
Borrow, Request, & Renew
Articles, Journals, & Databases
Research Help
Hours & Locations
Events
Ask a Question Now
Skip 13 subheader links
Home
Feedback
Discover ▾
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to ▾
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Login
⚲
Top
Uploaded Content
Content added by scholars through self-service upload
Active filters
Keywords
Cybersecurity
Cancel selected facet
Refine your results
Collection
25
Master of Science in Cybersecurity
25
School of Professional Studies
Format
22
text
3
moving image
Genre
22
Critical Challenge Project
3
animations (visual works)
Keywords
1
"Network Security"
1
Aerospace
1
Artificial intelligence (AI)
1
Assessment
1
Big data
Show More...
×
Close
Keywords
1
"Network Security"
1
Aerospace
1
Artificial intelligence (AI)
1
Assessment
1
Big data
1
Blockchain
1
Boards of Directors
1
CCPA
1
Children
1
Cloud service provider
2
Computer security
1
Cryptography
1
Cyber Incident Response
25
Cybersecurity
1
Data management
1
Defense Federal Acquisition Regulation Supplement (DFARS)
1
Department of Defense (DoD)
1
Digital transformation
1
Due Diligence
1
Encryption
1
Executive cybersecurity
1
Executive dashboard
1
Gap time
1
Harmonization
1
IOA
1
IOC
1
ITAR
1
Identity management
1
Implants
1
In-house counsel
1
Indications of Attack
1
Indications of Compromise
1
Insider threat
1
Laws
1
Legal
1
Metrics
1
Microchipping
1
NIST 800-171
1
National Association Corporate Directors (NACD)
1
Near-field communication (NFC)
1
Password security
3
Phishing
3
Privacy
1
Radio-frequency identification (RFID)
1
Ransomware
1
Risk
1
Risk Assessment
1
SD-WAN
1
SDN
1
Security ratings
1
Self-Sovereign Identity
1
Shared responsibility model
1
Small businesses
1
Software Defined Networks
1
Software Defined WAN
2
Training
1
User and entity behavior analytics (UEBA)
1
Vendor Assessment
1
Vendor Risk
1
Video animation
1
app based voting
1
compilers
1
cybercrime
1
digital weapons
1
fileless malware
1
freedom of speech
1
malware
×
Items
«
1
»
Items (1-25) out of 25 results
Sort by date (old to new)
relevance
title (A-Z)
title (Z-A)
date (old to new)
date (new to old)
new to the BDR
100 per page
10
per page
20
per page
50
per page
100
per page
View
normal
gallery
Boards of Directors and Cybersecurity
Improving Cybersecurity Training in The US Department Of Defense: Operation Vigilant Phoenix
Cyber Risk Scoring for Executives: An Assessment Framework
Expanding the Role of the Cloud Service Provider to Reduce the Burgeoning Insider Threat Risk
Children's Privacy
Accurately Measuring your Organizations Defensive Posture Against Phishing Attacks
Phishing Awareness Training
Can We Trust Security Ratings? - Use and Credibility of Third-party Security Vendor Security Ratings
Exploration of Artificial Intelligence in Cybersecurity
Developing Affordable Cyber Security Plans for Small and Medium Sized Businesses
Data Strategy is Business Strategy: Changing Conversations about Data Management
An In-House Counsel's Guide to Cybersecurity
Human Microchipping: Simplified Technology or Privacy Risk?
Self-Sovereign Identity: A Blockchain-Enabled Paradigm Shift for State Government Identity Management
Improving State's Incident Response
The Encryption Conniption
Ransomware
Phishing
Password Security
Making Mid-Century, Modern:Transitioning a Third Generation Small Gear Shop and Aerospace Company into the Modern Age
SD-WAN Implementation: Design and Security Considerations
Harmonizing Vendor Risk in the Financial Industry
The Agile Blue Team: Leveraging DevOps Concepts for Continuous Cyber Resiliency
The Benefits and Challenges of Creating Legal Definitions for Malware
Use of a Mobile Device App for Voting and its Challenges
«
1
»
Items (1-25) out of 25 results
×
Feedback
Loading...