UNDERSTANDING CYBERSECURITY THROUGH MORPHOLOGICAL ANALYSIS
Keywords:
cybersecurity, terminology, morphological analysis, cyber threats, digital safetyAbstract
This article explores the importance of understanding cybersecurity terminology in today's digital age. It explains how morphological analysis, breaking down words into their component parts, helps us grasp the meaning and function of cybersecurity terms.
References
Polyanichko, M. A. (2019). Application of a maturity model to action against internalthreats to information security. International research journal, 4 (82), 57–60. (In Russ.)
Christopher, J. (2018). The Cybersecurity Maturity Model: A Means To Measure And Improve Your Cybersecurity Program // Forbes. 01.11.2018. https://www.forbes.com/sites/forbestechcouncil/2018/11/01/thecybersecuritymaturity modelameanstomeasureandimproveyourcybersecurityprogram.
Grevatt, J. (2021). Seoul looks to enhance protection of military technologies against cyber attacks // Jane’s Defence. https://www.janes.com/defencenews/ newsdetail/seoullookstoenhanceprotectionofmilitarytechnologiesagainstcyberattacks_14765
https://www.mitnicksecurity.com/. 5.https://www.schneier.com/blog/archives/2017/02/security_and_th.html.
www.reddit.com/r/IOT/comments/ui6c7i/why_are_iot_devices_so_insecure/.