Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Scientific Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Jump Boxes

Real-Time and Retrospective Analyses of Cyber Security
Used as an additional authentication barrier for administrators to log in to other assets on the network such as servers in a different security zone.
Published in Chapter:
Attributed State Actors
Copyright: © 2021 |Pages: 33
DOI: 10.4018/978-1-7998-3979-8.ch004
Abstract
Chapter 4 looks at the technical aspects and effects of some attributed and high-profile state-sponsored cyber-attacks that have been encountered through our interaction with the networked world. Coverage also includes a look at the approach of nation-states against commercial companies as well as government institutions to achieve various objectives. The author uses these scenarios to focus attention on the important pillars of cyber security that all have important interrelationships in safeguarding of data and information. Within the context of their implementation, a weakness or series of weaknesses within one or more pillars can be enough to facilitate a cyber-attack. These pillars are underpinned by important factors, and the impact of improper cyber security considerations can be directly and indirectly problematic to continued e-commerce and our constructive evolution of knowledge sharing across the internet.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR