Applying DIKW Pyramid to Cyber-Attacks and Supply Chain Disruptions
Data The raw data related to cyber-attacks and supply chain disruptions consists of disordered signals or signs including network activity logs or records of supply chain operations disruption. The information may be connected to different activities such as outlier behaviour, log-in attempts, or chain of supply irregularities. They provide basic knowledge to deal with the ... Read More
Pages: 4 Words: 1058