Читать книгу Do No Harm - Matthew Webster - Страница 4

List of Illustrations

Оглавление

1 Chapter 1Figure 1-1: Example types of attacks against internet-connected medical devi...Figure 1-2: Number of healthcare data breaches of 500 or more records

2 Chapter 2Figure 2-1: The interconnection of IoMT technologies

3 Chapter 3Figure 3-1: Relationship of data science to enablement technologies

4 Chapter 5Figure 5-1: Number of exposed records 2005 to 2019Figure 5-2: Average per record cost in a breachFigure 5-3: 2019 PHI breached systems dataFigure 5-4: The cyber kill chain in a nutshell

5 Chapter 6Figure 6-1: Example of a scytaleFigure 6-2: Top 7 reported types of identity theft and numbers (2019)Figure 6-3: Some key privacy laws affecting the United States

6 Chapter 7Figure 7-1: Comparison between traditional crime and cybercrimeFigure 7-2: Top 10 Countries generating cybercrime

7 Chapter 8Figure 8-1: Development of malware in millions

8 Chapter 10Figure 10-1: Network communication via the OSI model

Do No Harm

Подняться наверх