Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM - Bridge of Knowledge

Search

Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

Best results in : Research Potential Pokaż wszystkie wyniki (1)

Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

  • Katedra Elektroenergetyki

    * ochrona i bezpieczeństwo pracy systemu elektroenergetycznego, * stabilność sterowanie pracą systemu elektroenergetycznego, * kompleksowe modelowanie systemów elektroenergetycznych oraz szczegółowe modele elementów systemu, * urządzenia FACTS i systemy HVDC w systemach elektroenergetycznych, * odnawialne źródła energii w systemach elektroenergetycznych, * urządzenia i instalacje elektryczne, * optymalizacja struktury i parametrów...

Best results in : Business Offer Pokaż wszystkie wyniki (2)

Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

Other results Pokaż wszystkie wyniki (6)

Search results for: ZARZĄDZANIE CYBERBEZPIECZEŃSTWEM

  • Zarządzanie cyberbezpieczeństwem - niestacjonarne 2023

    e-Learning Courses
    • R. Leszczyna

  • Zarządzanie cyberbezpieczeństwem - niestacjonarne 2024

    e-Learning Courses
    • R. Leszczyna

  • Rafał Leszczyna dr hab. inż.

    Dr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...

  • Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis

    Publication

    - Year 2020

    Contemporary approaches to the estimation of cybersecurity costs in organisations tend to focus on the cost of incidents or technological investments. However, there are other, less transparent costs related to cybersecurity management that need to be properly recognised in order to get a complete picture. These costs are associated with everyday activities and the time spent by employees on cybersecurity-related actions. Such...

    Full text available to download

  • Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study

    Publication

    - Year 2020

    The methods of cybersecurity costs' evaluation are inclined towards the cost of incidents or technological acquirements. At the same time, there are other, less visible costs related to cybersecurity that require proper recognition. These costs are associated with the actions and the time spent by employees on activities connected to cybersecurity management. The costs form a considerable component of cybersecurity expenditures,...

    Full text available to download