Academic literature on the topic 'CyberSecurty'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CyberSecurty.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CyberSecurty"

1

Ham, Jeroen Van Der. "Toward a Better Understanding of “Cybersecurity”." Digital Threats: Research and Practice 2, no. 3 (July 2021): 1–3. http://dx.doi.org/10.1145/3442445.

Full text
Abstract:
The term “cybersecurity” has gained widespread popularity but has not been defined properly. The term is used by many different people to mean different things in different contexts. A better understanding of “cybersecurity” will allow us a better understanding of what it means to be “cybersecure.” This in turn will allow us to take more appropriate measures to ensure actual cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
2

Calliess, Christian, and Ansgar Baumgarten. "Cybersecurity in the EU The Example of the Financial Sector: A Legal Perspective." German Law Journal 21, no. 6 (September 2020): 1149–79. http://dx.doi.org/10.1017/glj.2020.67.

Full text
Abstract:
AbstractCybersecurity in the financial sector is a dynamic and evolving policy field with unique challenges and specific characteristics. While it has recently received a lot of attention from disciplines like Economics and Politics, legal literature on this topic, especially with regard to EU law, still lags behind. This is surprising, given that cybersecurity in the EU is characterized by complex governance structures, a variety of legal sources, and a wide range of different rule makers and involved actors, and given that only a clear legal framework with efficient institutions at both EU and Member State level can provide for a safe digital environment. The purpose of this Article, therefore, is twofold: On the one hand, it aims to introduce the legal aspects of cybersecurity in the financial sector while taking stock of existing cybersecurity schemes, including their strengths and weaknesses from a legal perspective. On the other hand, it will set out key elements that cybersecurity regulation in the financial sector must respect in order to be effective and come up with reform proposals to make the EU financial sector more cybersecure.
APA, Harvard, Vancouver, ISO, and other styles
3

Campbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

BOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

CACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tagarev, Todor. "Intelligence, Crime and Cybersecurity." Information & Security: An International Journal 31 (2014): 05–06. http://dx.doi.org/10.11610/isij.3100.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "CyberSecurty"

1

Петрухно, Ігор Русланович. "Data Mining та машинні техніки навчання для виявлення вторгнення в кібербезпеку робототехнічних та автономних систем." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26428.

Full text
Abstract:
У роботі розглянуто проблему в області кібербезпеки повязану з методами аналізу великих масивів даних для робототехнічних систем. Об’єктом даної роботи є дослідницька система на базі методології паралельних обчислень використовуючи інструменти Hadoop. Предметом виступають методи та процеси Data Mining і машинних технік навчання для виявлення вторгнення в кібербезпеку робототехнічних і автономних систем. В поданої роботі, розглянуто основні особливості існуючої системи (SIEM). які дозволяє оброблювати великі масиви даних, її переваги та недоліки, Здійснений аналіз тактик по побудові Security Analitics System, які впливають на точність, надійність, продуктивність, масштабованість проектуємих IDS систем. Реалізована дослідницька система на базі методології паралельних обчислень використовуючи інструменти Hadoop, що забезпечує ефективне функціонування в умовах атак. Дана система може бути використана в діяльності конкретної установи, а також може бути використаний і іншими установами для вдосконалення паралельних обчислень використовуючи інструменти Hadoop, також дана концепція викладу даного дослідження може бути використана в якості методичного посібника при розробці системи виявлення вторгнення в кібербезпеку робототехнічних і автономних систем. Дозволяє збільшити швидкість обробки даних та зменшити час аналізу данних використовуючи парадигму MapReduce. Розмір пояснювальної записки – 111 аркушів, містить 31 ілюстрацій, 26 таблиць, 5 додатків.
The paper deals with the problem of cybersecurity associated with methods of analysis of large data sets for robotic systems. The object of this work is a research system based on the methodology of parallel computing using Hadoop tools. The subject is the methods and processes of Data Mining and machine learning techniques to detect the invasion of the cybersecurity of robotic and autonomous systems. In the given work, the main features of the existing system (SIEM) are considered. which allows processing large volumes of data, its advantages and disadvantages, Analysis of the tactics for constructing the Security Analitics System, which affect the accuracy, reliability, performance, scalability of project IDS systems. A research system implemented on the basis of parallel computing methodology using the Hadoop tools, which provides effective operation under attack conditions. This system can be used in the activities of a particular institution, and can also be used by other institutions to improve parallel computing using Hadoop tools, this concept can also be used as a methodological guide for the development of a system for detecting cybersecurity robotic and autonomous systems . Allows you to increase the speed of data processing and reduce the time of data analysis using the MapReduce paradigm. The size of the explanatory note is 111 sheets, contains 31 illustrations, 26 tables, 5 appendices.
APA, Harvard, Vancouver, ISO, and other styles
2

Poluzzi, Lorenzo. "IA & Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
L'integrazione tra Intelligenza Artificiale e Cybersecurity nasce per migliorare l'efficienza, la crescita e la possibilità di rendere sicuro un sistema col minore sforzo, perchè si creino già sistemi di protezione "intelligenti" in grado quindi di essere autonomi nel scovare nuovi attacchi e aggiornarsi, analizzare centinaia e centinaia di dati, traffico e prendere delle decisioni. Analizzerò separatamente diversi concetti di Cybersecurity, I.A. e come sia possibile integrare quest'ultima al fine di innalzare i livelli di sicurezza; si mostrerà anche un esempio pratico di un software (Attack Prophecy) che analizza il traffico della rete e tramite I.A. allerta l'utente e prende decisioni. Lo scopo di questo elaborato è di mettere in relazione Attack Prophecy con un altro Web Application Firewall (WAF) open source tra i più conosciuti chiamato ModSecurity che non integra al suo interno nessun meccanismo di Intelligenza Artificiale, così da avere un confronto tra i due Software e creare resoconto tra i benefici della Cybersecurity classica adoperata senza I.A. e la Cybersecurity impiegata tramite I.A. .
APA, Harvard, Vancouver, ISO, and other styles
3

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Full text
Abstract:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy adherence attitudes and perceived vulnerability to a cyberattack. The second phase of this research used the theory of planned behavior as a theoretical framework to model the relationship between personality facets, policy adherence attitudes, perceived vulnerability, locus of control, cybersecurity climate, and cybersecurity behaviors. While the hypothesized model had poor fit for the data, there was a strong relationship between cybersecurity attitudes (i.e. policy adherence attitudes and perceived vulnerability) and dutifulness, altruism, compliance, cybersecurity climate, and cybersecurity behavior. This research provides practical value to academic researchers and organizations by providing a scale to measure cybersecurity attitudes and to help organizations better understand the nature of the antecedents that lead to cybersecurity attitudes and behavior.
APA, Harvard, Vancouver, ISO, and other styles
4

Lingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.

Full text
Abstract:
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there exists a significant gap in theoretical framework utilizing qualitative methods to demystify the complex factors of engaging females to pursue the cybersecurity field. This study utilized a grounded theory approach to interview twelve female cybersecurity professionals to discover their perceptions of the cybersecurity field. The participants revealed strategies that could encourage females to pursue the cybersecurity field. Data analysis included a data coding process and a constant comparative method of interview transcripts. This study identified four factors of engagement and one unexpected co-factor that are perceived to have an impact on decisions to pursue the cybersecurity field. The four factors identified were awareness, support, intrinsic and extrinsic values. The interesting find of the cybersecurity mindset profile factor that is perceived to enhance the success of career trajectory warrants additional research to discover the impacts on decision to pursue the cybersecurity field. This findings of this research gives women a voice in recommending strategies to encourage other females to pursue the cybersecurity field. The findings also aid in demystifying the complexity of the factors by organizing and categorizing them in a logical sense in order to present a theoretical model to encourage females into the field of cybersecurity. Moreover, this study provides holistic insight to academicians and practitioners in developing future cybersecurity professionals. Additionally, it adds to the body of knowledge by answering the call for that additional qualitative approaches in methodology by bringing data richness and to generate new theoretical frameworks in cybersecurity research.
APA, Harvard, Vancouver, ISO, and other styles
5

Tagert, Adam C. "Cybersecurity Challenges in Developing Nations." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.

Full text
Abstract:
This thesis examines the guidance that is being given to developing nations that are rapidly deploying information and communication technologies. It studied the African countries of Rwanda and Tunisia to draw lessons of the situation and potential methods of improving the situation. The thesis found that developing nations are often recommended to implement a conglomeration of existing rules and regulations found in other countries especially in European countries and in the United States. Developing countries are also recommended to create national CERTs, organizations of cybersecurity experts to coordinate a nation to respond to cyber incidents. The proposed rules and regulations are largely irrelevant for developing nations and the proposed missions of a CERT do not match the needs of those countries. In promoting better guidance, the thesis identifies and discusses several challenges. It finds policy makers in developing nations are aware of the cyber threat, and that the cyber threat is different and often smaller in less ICT developed nations even if they are using similar equipment and software. To help craft better recommendations, the thesis identifies the benefits of ICT especially in agriculture, education and government. These benefits are analyzed to determine whether they would be protected by current guidance and the analysis determines that protecting ICT use in government should be the priority. In crafting future guidance the challenges are that nations have differences in ICT architecture and ICT use, and developing nations have fewer resources but also they have different resources to use. Another such difference is the common lack of a private cybersecurity sector and different expectations of government. This thesis concludes with discussing unexpected results. The first is Rwandan policy makers desire good enough security and have a higher risk tolerance concerning cyber threats than is found in more developed nations. In addition, open source software can be a potential way to reduce the cost of cyberspace defense and this thesis makes an initial investigation. The lesson of the thesis is that cybersecurity strategy is not a one size fits all and so it must be customized for each country.
APA, Harvard, Vancouver, ISO, and other styles
6

Falco, Gregory J. "Cybersecurity for urban critical infrastructure." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Urban Studies and Planning, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 110-116).
Our cities are under attack. Urban critical infrastructure which includes the electric grid, water networks, transportation systems and public health and safety services are constantly being targeted by cyberattacks. Urban critical infrastructure has been increasingly connected to the internet for the purpose of operational convenience and efficiency as part of the growing Industrial Internet of Things (HoT). Unfortunately, when deciding to connect these systems, their cybersecurity was not taken seriously. A hacker can monitor, access and change these systems at their discretion because of the infrastructure's lack of security. This is not only a matter of potential inconvenience. Digital manipulation of these devices can have devastating physical consequences. This dissertation describes three steps cities should take to prepare for cyberattacks and defend themselves accordingly. First, cities must understand how an attacker might compromise its critical infrastructure. In the first chapter, I describe and demonstrate a methodology for enumerating attack vectors across a citys CCTV security system. The attack methodology uses established cybersecurity typologies to develop an attack ruleset for an Al planner that was programmed to perform attack generation. With this, cities can automatically determine all possible approaches hackers can take to compromise their critical infrastructure. Second, cities need to prioritize their cyber risks. There are hundreds of attack permutations for a given system and thousands for a city. In the second chapter, I develop a risk model for urban critical infrastructure. The model helps prioritize vulnerabilities that are frequently exploited for HoT Supervisory Control and Data Acquisition (SCADA) systems. Finally, cities need tools to defend themselves. In the third chapter, I present a nontechnical approach to defending against attacks called cyber negotiation. Cyber negotiation is one of several non-technical cyberdefense tools I call Defensive Social Engineering, where victims can use social engineering against the hacker. Cyber negotiation involves using a negotiation framework to defend against attacks with steps urban critical infrastructure operators can take before, during and after an attack. This study combines computer science and urban planning (Urban Science) to provide a starting point for cities to prepare for and protect themselves against cyberattacks.
by Gregory J. Falco.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
7

Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.

Full text
Abstract:
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 successful business managers with cybersecurity responsibilities working for U.S. DoD contracting companies that successfully hired cybersecurity professionals in Hampton Roads, VA participated in the study. Data collection included semistructured interviews and a review of job postings from the companies represented by the participants. Coding, content, and thematic analysis were the methods used to analyze data. Within-methods triangulation was used to add accuracy to the analysis. At the conclusion of the data analysis, two main themes emerged: maintaining contractual requirements and a strong recruiting process. Contractual requirements guided how hiring managers hired cybersecurity personnel and executed the contract. A strong hiring process added efficiency to the hiring process. The findings of the study may contribute to positive social change by encouraging the recruitment and retention of cybersecurity professionals. Skilled cybersecurity professionals may safeguard businesses and society from Internet crime, thereby encouraging the safe exchange and containment of data.
APA, Harvard, Vancouver, ISO, and other styles
8

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Full text
Abstract:
In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process. If these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in these cybersecurity solutions. It is essential that all users be educated to combat any threats. Children are a particularly vulnerable subgroup within society. They are digital natives and make use of ICT, and online services with increasing frequency, but this does not mean they are knowledgeable about or behaving securely in their cyber activities. Children will be exposed to cyberspace throughout their lifetimes. Therefore, cybersecurity and cybersafety should be taught to children as a life-skill. There is a lack of well-known, comprehensive cybersecurity and cybersafety educational campaigns which target school children. Most existing information security and cybersecurity education campaigns limit their scope. Literature reports mainly on education campaigns focused on primary businesses, government agencies and tertiary education institutions. Additionally, most guidance for the design and implementation of security and safety campaigns: are for an organisational context, only target organisational users, and mostly provide high-level design recommendations. This thesis addressed the lack of guidance for designing and implementing cybersecurity and cybersafety educational campaigns suited to school learners as a target audience. The thesis aimed to offer guidance for designing and implementing education campaigns that educate school learners about cybersecurity and cybersafety. This was done through the implementation of an action research process over a five-year period. The action research process involved cybersecurity and cybersafety educational interventions at multiple schools. A total of 18 actionable guidelines were derived from this research to guide the design and implementation of cybersecurity and cybersafety education campaigns which aim to educate school children.
APA, Harvard, Vancouver, ISO, and other styles
9

Nilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.

Full text
Abstract:
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains that technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. All OISUs, from accountants to cybersecurity forensics experts, can place organizational assets at risk. However, that risk is increased when OISUs do not have the cybersecurity competency necessary for operating an information system (IS). The main goal of this research study was to propose and validate, using subject matter experts (SME), a reliable hands-on prototype assessment tool for measuring the cybersecurity competency of an OISU. To perform this assessment, SMEs validated the critical knowledge, skills, and abilities (KSA) that comprise the cybersecurity competency of OISUs. Primarily using the Delphi approach, this study implemented four phases of data collection using cybersecurity SMEs for proposing and validating OISU: KSAs, KSA measures, KSA measure weights, and cybersecurity competency threshold. A fifth phase of data collection occurred measuring the cybersecurity competency of 54 participants. Phase 1 of this study performed five semi-structured SME interviews before using the Delphi method and anonymous online surveys of 30 cybersecurity SMEs to validate OISU cybersecurity KSAs found in literature and United States government (USG) documents. The results of Phase 1 proposed and validated three OISU cybersecurity abilities, 23 OISU cybersecurity knowledge units (KU), and 22 OISU cybersecurity skill areas (SA). In Phase 2, two rounds of the Delphi method with anonymous online surveys of 15 SMEs were used to propose and validate OISU cybersecurity KSA measures. The results of Phase 2 proposed and validated 90 KSA measures for 47 knowledge topics (KT) and 43 skill tasks (ST). In Phase 3, using the Delphi method with anonymous online surveys, a group of 15 SMEs were used to propose and validate OISU cybersecurity KSA weights. The results of Phase 3 proposed and validated the weights for four knowledge categories (KC) and four skill categories (SC). When Phase 3 was completed, the MyCyberKSAsTM prototype assessment tool was developed using the results of Phases 1-3, and Phase 4 was initiated. In Phase 4, using the Delphi method with anonymous online surveys, a group of 15 SMEs were used to propose and validate an OISU cybersecurity competency threshold (index score) of 80%, which was then integrated into the MyCyberKSAsTM prototype tool. Before initiating Phase 5, the MyCyberKSAsTM prototype tool was fully tested by 10 independent testers to verify the accuracy of data recording by the tool. After testing of the MyCyberKSAsTM prototype tool was completed, Phase 5 of this study was initiated. Phase 5 of this study measured the cybersecurity competency of 54 OISUs using the MyCyberKSAsTM prototype tool. Upon completion of Phase 5, data analysis of the cybersecurity competency results of the 54 OISUs was conducted. Data analysis was conducted in Phase 5 by computing levels of dispersion and one-way analysis of variance (ANOVA). The results of the ANOVA data analysis from Phase 5 revealed that annual cybersecurity training and job function are significant, showing differences in OISU cybersecurity competency. Additionally, ANOVA data analysis from Phase 5 showed that age, cybersecurity certification, gender, and time with company were not significant thus showing no difference in OISU cybersecurity competency. The results of this research study were validated by SMEs as well as the MyCyberKSAsTM prototype tool; and proved that the tool is capable of assessing the cybersecurity competency of an OISU. The ability for organizations to measure the cybersecurity competency of OISUs is critical to lowering risks that could be exploited by cyber threats. Moreover, the ability for organizations to continually measure the cybersecurity competency of OISUs is critical for assessing workforce susceptibility to emerging cyber threats. Furthermore, the ability for organizations to measure the cybersecurity competency of OISUs allows organizations to identify specific weaknesses of OISUs that may require additional training or supervision, thus lowering risks of being exploited by cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Taiola, Matteo. "Cybersecurity in impianti dell'industria di processo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
Nel corso degli ultimi decenni, i processi industriali hanno subito una sempre maggiore automatizzazione e una crescente connessione con reti esterne. Nell’industria di processo, dove il livello di automazione è sempre stato elevato, l’innovazione tecnologica ha richiesto sempre una maggiore interconnessione tra i sistemi di produzione e sistemi esterni di gestione. La connessione dei sistemi ha portato a una crescita economica, ottimizzazione dei processi e un aumento della velocità di produzione, dovuti alla gestione dei controlli del processo e dei dati di funzionamento; ciò però, ha portato anche a esporre l’azienda a rischi per la sicurezza da attacchi informatici. Le minacce alla sicurezza sui sistemi di controllo automatizzato industriale stanno diventando una preoccupazione crescente per tutti gli impianti industriali, in particolare per quelli in cui grandi quantità di sostanze pericolose sono immagazzinate o manipolate. Lo scopo di questa tesi è verificare l’applicabilità e l’efficacia di due metodologie proposte per l’identificazione degli scenari che possono avere luogo in seguito alla manipolazione dannosa (eseguita da remoto o in seguito ad accesso fisico nella sala controllo) del sistema di controllo e sicurezza di un impianto di processo: PHAROS (Process Hazard Analysis of Remote manipulations through the cOntrol System) e POROS (Process Operability analysis of Remote manipulations through the cOntrol System). PHAROS permette d’ identificare gli eventi pericolosi originati dalle apparecchiature di processo, che possono essere innescati attraverso una manipolazione malevola dei BPCS e del SIS; mentre POROS mira all'individuazione dei top event che possono portare all'arresto dell'impianto e alla conseguente interruzione della produttività per un certo periodo di tempo, causata da una manipolazione malevola.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "CyberSecurty"

1

Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Donaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. Enterprise Cybersecurity. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Conti, Mauro, Gaurav Somani, and Radha Poovendran, eds. Versatile Cybersecurity. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Waschke, Marvin. Personal Cybersecurity. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2430-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ayala, Luis. Cybersecurity Lexicon. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2068-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beissel, Stefan. Cybersecurity Investments. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30460-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaplan, James M., Tucker Bailey, Chris Rezek, Derek O'Halloran, and Alan Marcus, eds. Beyond Cybersecurity. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119055228.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "CyberSecurty"

1

Wolfe, Jennifer C. "Cybersecurity." In Disruption in the Boardroom, 51–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zaffar, Ehsan. "Cybersecurity." In Understanding Homeland Security, 399–439. Abingdon, Oxon; New York. NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jackson, Scott, and Ricardo Moraes dos Santos. "Cybersecurity." In Systems Approach to the Design of Commercial Aircraft, 57–60. First edition. | Boca Raton, FL : CRC Press, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kulesza, Joanna. "Cybersecurity." In Encyclopedia of Big Data, 1–5. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_53-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Refsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roy, Jeffrey. "Cybersecurity." In Public Administration and Information Technology, 59–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Siers, Rhea. "Cybersecurity." In Security Studies, 556–68. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 1–13. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 669–80. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Islam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CyberSecurty"

1

Abdel-Fattah, Farhan, Fadel AlTamimi, and Khalid A. Farhan. "Machine Learning and Data Mining in Cybersecurty." In 2021 International Conference on Information Technology (ICIT). IEEE, 2021. http://dx.doi.org/10.1109/icit52682.2021.9491749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rossi, Paola, Itai Sela, Adam Rizika, Diogenes Angelidis, Mark Duck, and Ron Morrison. "Cyberdefence of Offshore Deepwater Drilling Rigs." In Offshore Technology Conference. OTC, 2021. http://dx.doi.org/10.4043/31235-ms.

Full text
Abstract:
Abstract An alternative methodology using new preventative technology to manage cybersecurity exposure on deepwater drilling rig assets is presented. For the past two years Shell's Deepwater Wells business has been evaluating typical cyber defence approaches and undertaken cybersecurity risk assessments and penetration tests. These activities have demonstrated the challenges attaining cybersecure drilling rig environments. Whilst cyberattacks increase in frequency, adaptability, and become cheaper to launch, regulatory and liability insurance requirements are also evolving. To achieve the goal of cyber-resilience, a major Operator has collaborated with a cybersecurity firm to trial technology for rapidly and reliably protecting deepwater rigs. The paper presents aspects of the numerous challenges faced and offers a different approach using new technology applied to both supplement and accelerate the attainment of a cyber-resilient environment onboard deepwater drilling rigs. It shares the deep dive lessons learnt leading to a more comprehensive understanding of how to protect drilling rigs and their safety critical control systems. Aside from addressing technical attributes using risk vs. maturity based methods, the approach also caters to business demands of short term rig contracts, managing multi-vendor legacy systems and satisfying increasing digitalisation/remote access needs with associated reductions in overall cybersecurity CAPEX spend.
APA, Harvard, Vancouver, ISO, and other styles
3

Dlamini, Moses, Hein Venter, Jan Eloff, and Mariki Eloff. "Digital deception in cybersecurity: an information behaviour lens." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2018.

Full text
Abstract:
Introduction. Digital deception is a double-edged sword used by both blackhats and whitehats in cybersecurity. A status quo review of the reintroduction of digital deception can reveal challenges and initiatives and show how information behaviour expertise might inform cybersecurity research and vice versa. Aim. To use a status quo review of digital deception to reveal links between cybersecurity and information behaviour and to stimulate further research. Method. Critical review of digital deception in cybersecurity regarding whitehats and blackhats using an information behaviour lens. Findings. There is a need for research that tackles digital deception from both information behaviour and cybersecurity. There is also a need to bridge the gap between the two research fields and link cybersecurity concepts with information behaviour theories. Conclusions. The reintroduction of digital deception in cybersecurity highlights the challenges for the unreliability of defence-based detection systems. Although many solutions are available from cybersecurity, information behaviour might contribute to multidisciplinary research on digital deception and the future of defence technologies. Understanding the interplay between whitehats and blackhats in cybersecurity can help information behaviour practitioners to design models or frameworks for predicting changes in information-seeking behaviour.
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Euiyoung, Jieun Kwon, JungKyoon Yoon, and Alice M. Agogino. "Embedding Cybersecurity Into Design Education: Increasing Designers’ Awareness of Cybersecurity Throughout the Design Process." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97720.

Full text
Abstract:
Abstract As more digital devices with sensing capabilities are introduced into users’ daily lives, the risks of threats to data and privacy and security have increased. While cybersecurity has been acknowledged as an important concern in developing products with digital services, currently available design methodologies and practices offer limited effective guidance to designers to explicitly address cybersecurity issues. In this paper, we present a case study from a product design course at the University of California, Berkeley, where the course’s teaching team implemented an intervention in the form of cybersecurity-focused educational materials into the design process. The baseline and post-intervention survey results indicate that the cybersecurity intervention throughout the course had positively influenced the students’ awareness of cybersecurity (p < 0.001, SD = 0.79, 26% increase in score, Cohen’s d = 0.81). The intervention provoked the designers to consider and include aspects of cybersecurity in developing their design solutions throughout most of the design process. However, their increased awareness aside, the extent of the student teams considering cybersecurity had tapered off over the 6-week design course with little noticeable influence in the final design.
APA, Harvard, Vancouver, ISO, and other styles
5

Easttom, Chuck. "Applying Mathematics and Engineering Techniques to Cyber Security." In Congreso Internacional de Ingeniería de Sistemas. Universidad de Lima, 2021. http://dx.doi.org/10.26439/ciis2021.5575.

Full text
Abstract:
While there are many approaches to cybersecurity, it is common for those approaches to be somewhat ad hoc or subjective. Cybersecurity needs a rigorous mathematical and engineering approach, which can be applied to address security issues, evaluate security controls, and investigating security breaches. The current paper maps the use of engineering and mathematical tools for cybersecurity purposes.
APA, Harvard, Vancouver, ISO, and other styles
6

Chopra, Shubham, Hitesh Marwaha, and Anurag Sharma. "Cyber-Attacks Identification and Measures for Prevention." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2022. http://dx.doi.org/10.19107/cybercon.2022.11.

Full text
Abstract:
In the present digitization era, almost everything is available online, at just one click away from us, which offer a lot of opportunities, like saving a lot of time, but also many challenges, due to the existence of many cyber-attacks, more complex and difficult to be detected. The cyber-attacks effects can be data theft, modification, or alteration. In recent time, cybersecurity is very important also in the academic field, because schools and universities systems are connected online. To protect our data from various attacks, cybersecurity plays the most important key role. Cybersecurity helps in ensuring the safety of data, personally identifiable information, and intellectual property. Cybersecurity is not only for individuals, a specific group or organization, but it is for all the people and for the government to keep data integrity, confidentiality, and availability. This paper presents the cybersecurity concept, analyzing different cyber-attacks and the specific preventions measures.
APA, Harvard, Vancouver, ISO, and other styles
7

Kemmerer, R. A. "Cybersecurity." In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maymí, Fernando J. "Cybersecurity." In SIGITE '19: The 20th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thapa, Bipun. "Sentiment Analysis of Cyber Security Content on Twitter and Reddit." In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120708.

Full text
Abstract:
Sentiment Analysis provides an opportunity to understand the subject(s), especially in the digital age, due to an abundance of public data and effective algorithms. Cybersecurity is a subject where opinions are plentiful and differing in the public domain. This descriptive research analyzed cybersecurity content on Twitter and Reddit to measure its sentiment, positive or negative, or neutral. The data from Twitter and Reddit was amassed via technology-specific APIs during a selected timeframe to create datasets, which were then analyzed individually for their sentiment by VADER, an NLP (Natural Language Processing) algorithm. A random sample of cybersecurity content (ten tweets and posts) was also classified for sentiments by twenty human annotators to evaluate the performance of VADER. Cybersecurity content on Twitter was at least 48% positive, and Reddit was at least 26.5% positive. The positive or neutral content far outweighed negative sentiments across both platforms. When compared to human classification, which was considered the standard or source of truth, VADER produced 60% accuracy for Twitter and 70% for Reddit in assessing the sentiment; in other words, some agreement between algorithm and human classifiers. Overall, the goal was to explore an uninhibited research topic about cybersecurity sentiment.
APA, Harvard, Vancouver, ISO, and other styles
10

"Cybersecurity, IT-aided Education, and TeLEs: Nexus, Vistas & Realities." In InSITE 2019: Informing Science + IT Education Conferences: Jerusalem. Informing Science Institute, 2019. http://dx.doi.org/10.28945/4153.

Full text
Abstract:
Background: The current decade has witnessed rising spates of threats and attacks that have threatened the safety and security of cyberspace, thereby giving rise to contemporary discourses pertaining the realities that these ominous trends portend for technology innovation and digitalisation, in the emerging global digital society. In the process, the technological capabilities that have been used to effectively harness the efficiency that this virtual space provides for contemporary education and learning have been defamed. Aim/Purpose: This exploratory research interrogates the possible relationships between the contemporary concerns of global cyber security, and the realities and prospects of IAE and TeLEs, while elucidating the crucial factors that impose on such relationship(s). Methodology: This research adopts the qualitative research methodology with an exploratory approach to interrogate the various contemporary concerns of global cybersecurity as contained in existing literature, especially as it affects the proliferation and adoption of IT-aided education and Technology-enhanced Learning Environments (TeLEs); based on a systematic correlational analysis of key interposing concepts. Contribution: The research presents an overview of the current status and prospects of development of IAE and TeLEs, as well as the nature of the realities associated with contemporary concerns of global cybersecurity; then also discussing how these cybersecurity concerns impact on the wider adoption and implementation of IAE and TeLEs. Findings: The contemporary concerns of global cybersecurity that were discovered to impact on IAE and TeLEs include: Academic Dishonesty, Misconduct and Malpractice, Fake News, Steganography & Malware, and Cyberbullying. The interrogation of these concerns lead to an elucidation of the associated factors and interactions that have hampered the wider development and adoption of IAE and TeLEs for education, teaching and learning in the 21st century. These are properly positioned in reality by drawing on evidences and deductions from existing researches, and supported with real-life case studies to explain the implications of the portended realities for the emerging global information society. Recommendations for Practitioners & Researchers: The EMINDA cybersecurity framework for TeLEs is presented as a better way forward for lifting the future of IAE and TeLEs out of the quagmire it has been plunged into by the contemporary concerns of global cybersecurity. This framework synthesizes aspects of existing security strategies that have been deployed successfully to insure cybersecurity for various other digital and technological application domains. Impact on Society: The revolutionary impact of technology and digitization of teaching and learning in the modern era has come to stay, with exciting prospects for the future of the emerging global information society. At the same time, the realities of global cybersecurity have equally come to stay with rather daunting consequences and debilitating future prospects. This research presents a way forward even in light of these debilitating concomitant realities. Future Research: Future research would focus on implementing the EMINDA cybersecurity framework in a prototype TeLE, and evaluating the effectiveness and efficiency of the framework in guaranteeing cybersecurity for a test case sample of participants that would feature in the evaluation.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "CyberSecurty"

1

Joo, Jhi Young, Emma Stewart, Benjamin Salazar, and Nathan Yee. Selection of Ten (10) Cybersecurity Scenarios For Project Cybersecure Interconnection of Distributed Energy Resources. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1498462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Florakis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. Cybersecurity Risk. Cambridge, MA: National Bureau of Economic Research, December 2020. http://dx.doi.org/10.3386/w28196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alecu, Iulian, Costel Ciuchi, Toma Cimpeanu, Iulian Coman, Larisa Gabudeanu, Ioan-Cosmin Mihai, Cosmina Moghior, et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, January 2021. http://dx.doi.org/10.19107/cybersec.2021.en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Fort Belvoir, VA: Defense Technical Information Center, August 2014. http://dx.doi.org/10.21236/ada608802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Gaithersburg, MD: National Institute of Standards and Technology, August 2017. http://dx.doi.org/10.6028/nist.sp.800-181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Newhouse, Bill. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Ukrainian translation). National Institute of Standard and Technology, May 2022. http://dx.doi.org/10.6028/nist.sp.800-181.ukr.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Jay Tillay. PV Cybersecurity Final Report. Office of Scientific and Technical Information (OSTI), January 2019. http://dx.doi.org/10.2172/1491601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stouffer, Keith, Timothy Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey Cichonski, and John McCarthy. Cybersecurity framework manufacturing profile. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.ir.8183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography