Journal articles on the topic 'Cyborg landscapes'

To see the other types of publications on this topic, follow the link: Cyborg landscapes.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyborg landscapes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lokman, Kees. "Cyborg landscapes: Choreographing resilient interactions between infrastructure, ecology, and society." Journal of Landscape Architecture 12, no. 1 (January 2, 2017): 60–73. http://dx.doi.org/10.1080/18626033.2017.1301289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Purnomo, Arif D., Charles Lim, and Burman Noviansyah. "Threat Hunting Early Experiment through Event Correlation and Memory Forensic." ACMIT Proceedings 6, no. 1 (July 6, 2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.

Full text
Abstract:
The cyber threat landscapes nowadays are dynamically evolving over time, the cyber security practitioner in corporations need to adapt with more sophisticated way with the latest cyber threat attacks are launched. Cyber Threat Intelligence is one of the tools that can be utilized as a cyber threat detection. Generally, CTI operates by integrating its directory with events collected from Security Information and Event Management (SIEM) to correlates all of the appliances logs within corporation and providing summarized and meaningful information that can be reviewed to identify legitimate malicious cyber threat activity. However, relying only CTI subscription that only contains blacklist domain and ip addresses integrated with SIEM will only provide passive detection for known cyber threats. The needs for proactive cyber threat detection is required to compete with the modern threat landscape. This research work will try to explore the possibility of detecting unknown or undetected cyber threats using network event correlation and memory forensic to validate its existence. Throughout this research time span, we’re able to discover malicious network pattern that is proven to be undetected within internal organization endpoint protection. Therefore, this research will provide baseline for threat hunting activity based on network behavioural pattern.
APA, Harvard, Vancouver, ISO, and other styles
3

Heise, Ursula K. "The Android and the Animal." PMLA/Publications of the Modern Language Association of America 124, no. 2 (March 2009): 503–10. http://dx.doi.org/10.1632/pmla.2009.124.2.503.

Full text
Abstract:
Pixar's animated feature wall-E (2008) revolves around a sentient robot, a small trash compactor who faith fully continues his programmed duties seven hundred years into the future, after humans have long abandoned their polluted home planet. Landscaped into skyscrapers of compacted waste, Earth no longer seems to harbor any organic life other than a cockroach, Wall-E's only and constant friend. Similarly, in Mamoru Oshii's Ghost in the Shell 2: Innocence (2004; ), sequel to the groundbreaking first Ghost in the Shell anime, the love of the cyborg police officer Batou for his vanished colleague Motoko Kusanagi is surpassed only by the care and affection he displays for his pet basset hound. These films are two recent examples of works of science fiction in which the emergence of new kinds of humanoid consciousness in robots, cyborgs, or biotechnologically produced humans is accompanied by a renewed attention to animals. Why? In what ways does the presence of wild, domestic, genetically modified, or mechanical animals reshape the concerns about the human subject that are most centrally articulated, in many of these works, through technologically produced and reproduced human minds and bodies?
APA, Harvard, Vancouver, ISO, and other styles
4

Jimenez-Zepeda, Victor, Donna E. Reece, McCurdy R. Arleigh, Esther Masih-Khan, Eshetu G. Atenafu, Michael Sebag, Julie Stakiw, et al. "Real-World Outcomes with Bortezomib-Containing Regimens and Lenalidomide Plus Dexamethasone for the Treatment of Transplant Ineligible MM Patients: A Multi-Institutional Report from the National Myeloma Canada Research Network (MCRN) Database." Blood 132, Supplement 1 (November 29, 2018): 2008. http://dx.doi.org/10.1182/blood-2018-99-117363.

Full text
Abstract:
Abstract Introduction: Bortezomib-containing regimens (BCRs) have been the standard frontline approach for the treatment of transplant ineligible multiple myeloma (TIMM) patients in Canada for many years. Based on recent randomized clinical trial results lenalidomide and dexamethasone (Ld) has become another provincially funded option in Canada in the same therapeutic space. We aimed to compare the effect of BCRs and Ld for the treatment of TIMM using the newly-formed Myeloma Canada Research Network Multiple Myeloma Database (MCRN-MM-DB) project. This web-based centralized platform can track and characterize real-world outcomes of patients treated at major Canadian institutions and includes both legacy data dating back to 2007 (from 4 centres) as well as ongoing prospective data collection (from 11 centres) analyzed up to 01/07/18. Patients and Methods: The primary objective was to assess the ORR, PFS and OS for TIMM patients treated with CyBorD/CyBorP, Ld, VMP or VD/VP, each given as reported previously but with dose-adjustments at the discretion of the treating physician to maintain patients on therapy. The two-sided Fisher exact test was used to test for differences between categorical variables. Survival curves were constructed according to the Kaplan-Meier method and compared using the log rank test; a p value of <0.05 was considered significant. Results: 842 TIMM patients were evaluated. Clinical characteristics are shown in Table 1. Median OS and PFS for the entire cohort were 54.1 and 20.4 months, respectively. ORR and ≥VGPR better rates were 83% and 52% for the entire cohort. A ≥VGPR rate of 53%, 46%, 56% and 51% were observed for patients treated with CyBorD/P, VMP, Ld and VD/VP, respectively (p=0.3). The median PFS was longer for Ld patients (25 months) compared to CyBorD/CyBorP, VMP and Vd/VP (19.3, 20.5 and 13.7 months, respectively), (p=0.03, Fig 1a); there was no significant difference in PFS between the 2 different alkylating-agent containing regimens when combined with bortezomib + steroids (CyBorD/P vs VMP, p =0.9). Median OS was 51, 59.5, 29.4 and 66.5 months for those patients treated with CyBorD/CyBorP, VMP, VD/VP and Ld, respectively (p=0.07, Fig 1b). When the OS and PFS for CyBorD/P (typically given for a fixed duration of 9 cycles) were compared with Ld in a subset analysis, the p-values were 0.08 and 0.008, respectively. Conclusions: 1) OS was not significantly different in patients treated with either a bortezomib-containing triplet that includes an alkylator + steroid or continuous Ld. 2) The BCR triplets and Ld were more efficacious than the bortezomib + steroid doublet (VD/VP) for both OS and PFS although, the small sample size and adverse factors, such as frailty and comorbidities, may have influenced the findings. 3) The results in the real-world setting, i.e., a median PFS in the range of 1.5-2 years and median OS of 4.5-5.5 years, confirm triplet-based BCRs and Ld as current valid standards of care for frontline therapy in TIMM. 5) This study confirms the utility of a large comprehensive national database to benchmark current results for comparison with newer regimens as they are introduced into the Canadian therapeutic landscape. Disclosures Arleigh: Celgene: Honoraria; Janssen: Honoraria. Sebag:Janssen Inc.: Membership on an entity's Board of Directors or advisory committees; Amgen Canada: Membership on an entity's Board of Directors or advisory committees; Takeda Canada: Membership on an entity's Board of Directors or advisory committees; Celgene Canada: Membership on an entity's Board of Directors or advisory committees. Leblanc:Celgene Canada: Membership on an entity's Board of Directors or advisory committees; Janssen Inc.: Membership on an entity's Board of Directors or advisory committees; Amgen Canada: Membership on an entity's Board of Directors or advisory committees; Takeda Canada: Membership on an entity's Board of Directors or advisory committees. Louzada:Janssen: Honoraria; Celgene: Honoraria; amgen: Honoraria; pfizer: Honoraria. Venner:Janssen: Honoraria, Research Funding; Celgene: Honoraria, Research Funding; Amgen: Honoraria; Takeda: Honoraria.
APA, Harvard, Vancouver, ISO, and other styles
5

Ramsdale, Andrew, Stavros Shiaeles, and Nicholas Kolokotronis. "A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages." Electronics 9, no. 5 (May 16, 2020): 824. http://dx.doi.org/10.3390/electronics9050824.

Full text
Abstract:
The sharing of cyber-threat intelligence is an essential part of multi-layered tools used to protect systems and organisations from various threats. Structured standards, such as STIX, TAXII and CybOX, were introduced to provide a common means of sharing cyber-threat intelligence and have been subsequently much-heralded as the de facto industry standards. In this paper, we investigate the landscape of the available formats and languages, along with the publicly available sources of threat feeds, how these are implemented and their suitability for providing rich cyber-threat intelligence. We also analyse at a sample of cyber-threat intelligence feeds, the type of data they provide and the issues found in aggregating and sharing the data. Moreover, the type of data supported by various formats and languages is correlated with the data needs for several use cases related to typical security operations. The main conclusions drawn by our analysis suggest that many of the standards have a poor level of adoption and implementation, with providers opting for custom or traditional simple formats.
APA, Harvard, Vancouver, ISO, and other styles
6

Alhajjar, Elie, and Kevin Lee. "The U.S. Cyber Threat Landscape." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 18–24. http://dx.doi.org/10.34190/eccws.21.1.197.

Full text
Abstract:
Cybersecurity is concerned with protecting information, hardware, and software on the internet from unauthorized use, intrusions, sabotage, and natural disasters. It is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage, or unauthorized access. The numerous ways in which computer systems and data can be compromised and the dramatic increase in cybercrimes have made cybersecurity a growing field. One of the most problematic elements of cybersecurity is the quick and constant evolving nature of security risks in critical infrastructure and major businesses all around the world. In this paper, we sketch a general frame for the cyber threat landscape in the United States of America by focusing on five major categories: ransomware, social engineering, third party software, deep fakes, and insider threats. We elaborate on each of these pillars by providing case studies from the past decade, as well as discussing ways to move forward.
APA, Harvard, Vancouver, ISO, and other styles
7

Furnell, Steven, and Samantha Dowling. "Cyber crime: a portrait of the landscape." Journal of Criminological Research, Policy and Practice 5, no. 1 (February 28, 2019): 13–26. http://dx.doi.org/10.1108/jcrpp-07-2018-0021.

Full text
Abstract:
Purpose The purpose of this paper is to review current evidence in relation to scale and impacts of cyber crime, including various approaches to defining and measuring the problem. Design/methodology/approach A review and analysis of survey evidence is used to enable an understanding of the scope and scale of the cyber crime problem, and its effect upon those experiencing it. Findings The analysis evidences that cyber crime exists in several dimensions, with costs and harms that can be similarly varied. There is also a sense that, moving forward, the “cyber” label will become somewhat redundant as many crimes have the potential to have a technology component. Research limitations/implications The key evidence in this particular discussion has some geographic limitations, with much of the discussion focussed upon data drawn from the Crime Survey for England and Wales, as well as other UK-based sources. However, many of the broader points still remain more widely relevant. Practical implications This study helps in: better understanding the range and scale of cyber crime threats; understanding how the cyber element fits into the wider context of crime; improving the appreciation of what cyber crime can mean for potential victims; and recognising the cost dimensions, and the implications for protection and response. Social implications The discussion will help businesses and individuals to have a better appreciation of the cyber crime threat, and what ought to be considered in response to it. Originality/value The discussion is based upon recent evidence, and therefore represents a more up-to-date view of the cyber crime landscape than reviews already available in earlier literature.
APA, Harvard, Vancouver, ISO, and other styles
8

Deakin, Mark. "From The City Of Bits to E-Topia." International Journal of E-Adoption 6, no. 1 (January 2014): 16–33. http://dx.doi.org/10.4018/ijea.2014010102.

Full text
Abstract:
Mitchell's book on the City of Bits, sets out a vision of urban life literally done to bits. His next book e-topia, provides the counter-point to this vision of urban life and scenario where the city is no longer left in bits and pieces, but a place where it ‘all comes together'. As Mitchell states in Me++: the Cyborg Self and the Networked City, all this ‘coming together' becomes possible because the trial separation of bits and atoms is over and the dissolution of the boundaries between virtual and physical space now makes citizenship worth playing for. The landscape which this paper uncovers is different. For it reveals the middle ground between the ‘high-level' issues surrounding e-topia and those lying at the ‘grass roots' level of me ++ and the cyborg-self. This is because it is here and with the likes of Laclau and Mouffe and Zizek, that matters which concern the ‘city of bits' and notion of ‘e-topia' as the ‘me++ of the cyborg self', get ‘bottomed out' as the space, citizenship and community of global strategy.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaloudi, Nektaria, and Jingyue Li. "The AI-Based Cyber Threat Landscape." ACM Computing Surveys 53, no. 1 (May 29, 2020): 1–34. http://dx.doi.org/10.1145/3372823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Civitarese, Giuseppe. "Do cyborgs dream? Post‐human landscapes in Shinya Tsukamoto’s Nightmare Detective (2006)." International Journal of Psychoanalysis 91, no. 4 (August 2010): 1005–16. http://dx.doi.org/10.1111/j.1745-8315.2010.00305.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Rahardi, Kunjana. "LANSKAP KONTEKS EKSTRALINGUISTIK VIRTUAL DALAM PRAGMATIK SIBER." Linguistik Indonesia 40, no. 1 (February 3, 2022): 39–48. http://dx.doi.org/10.26499/li.v40i1.287.

Full text
Abstract:
This study aims to describe the virtual external context landscape in a pragmatic study with a cyber perspective. The research problem of cyber pragmatics is formulated as follows: How is the virtual external context landscape in the perspective of cyber pragmatics? The object of this research is the manifestation of the virtual external context landscape in the perspective of cyber pragmatics. The data of this research are utterances which contain the virtual external context landscape. The data sources of this research are natural texts which contain data about the virtual external context landscape as the source of the substantive data. The source of locational data is natural texts obtained from social media Twitter. The data collection method applied is the see method. The techniques used for listening are recording techniques and note-taking techniques. The last step in data collection is typification so that data types are produced that are ready to be subjected to data analysis methods and techniques. There are two methods applied to analyze the research data, namely the distributional method and the equivalent method. The distributional method is used to reach the linguistic aspects, while the equivalent method is used to reach the external linguistic aspects of this research. The results of this cyber pragmatics research show that the manifestation of the virtual external context landscape is different from the conventional external context landscape. Differences in landscape manifestations can occur in the elements of the context which are the impact of technological developments. In addition, differences in landscape manifestations can also occur in aspects of these context elements as a result of the development of information technology and digital technology as well as internet technology. The landscape aspects of the context elements must be well formulated so that the meaning of speech intentions in the cyber pragmatics perspective can be carried out properly. Inaccuracy in the formulation of the virtual external context landscape will cause the meaning of speech intent to give rise to many misunderstandings. The results of this study are expected to contribute a lot to the development of pragmatics so that pragmatics develops not only systemic pragmatics, general pragmatics, and pragmatics in a culture-specific perspective, but also pragmatics (cyberpragmatics) whose development still needs to be encouraged in Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
12

Muhammad Riaz Shad. "Cyber Threat Landscape and Readiness Challenge of Pakistan." Strategic Studies 39, no. 1 (April 24, 2019): 1–19. http://dx.doi.org/10.53532/ss.039.01.00115.

Full text
Abstract:
Today, vital social infrastructures — electricity, finance, water, transportation, health and food — are increasingly dependent on the Information and Communication Technology (ICT) networks for functioning, distribution and interconnectedness. This dependence results in both opportunities and vulnerabilities, which can be exploited by a variety of actors ranging from individuals to organisations and governments. This indicates that information revolution, experienced by the contemporary world, is both a boon and bane. To a large extent, it is a bane because the ICT has an ‘enabling function’ for disruption, crime and state-level aggression. The ICT dependence may become more prone to vulnerabilities in the times of social unrest, political tensions and other appalling events. At present, Pakistan experiences a fast growing application of the ICT in different sectors but seriously lacks in cyber readiness. In addition, the country confronts a hostile security environment internally as well as externally. These factors expose it to various cyber threats. Drawing on the securitisation theory, this paper attempts to examine the cyber threat landscape of Pakistan and focuses on the cyber threats that the country faces across the spectrum — hacking, serious and organised cybercrime, cyberterrorism and cyberwarfare. This is followed by an evaluation of Pakistan’s cyber readiness profile in the light of the five-pillar criteria laid down by the UN specialised agency the International Telecommunication Union (ITU), namely legal, technical, organisational, capacity building and international cooperation.
APA, Harvard, Vancouver, ISO, and other styles
13

Chatzis, Petros, and Eliana Stavrou. "Cyber-threat landscape of border control infrastructures." International Journal of Critical Infrastructure Protection 36 (March 2022): 100503. http://dx.doi.org/10.1016/j.ijcip.2021.100503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Scheiber, Laura L., and Judson Byrd Finley. "Domestic campsites and cyber landscapes in the Rocky Mountains." Antiquity 84, no. 323 (March 1, 2010): 114–30. http://dx.doi.org/10.1017/s0003598x00099804.

Full text
Abstract:
The dwellings of prehistoric Native North Americans are amongst the hardest archaeological structures to find and characterise – they leave only a shallow ring of stones. But the authors show that, when recorded to modern levels of precision, these tipi-stances contain a wealth of information. The stone rings are mapped in detail by hand, and located by GPS, their hearths are located by fluxgate survey and sampled for radiocarbon dating, and the results displayed in layered maps on GIS. Different social groups had different floor plans, so that, even where artefacts are missing, the movement of peoples can be dated and mapped. The results also bring to the fore the great cultural value of these, the dominant monument types of Bighorn Canyon National Recreational Area.
APA, Harvard, Vancouver, ISO, and other styles
15

Zajko, Mike. "Canada’s cyber security and the changing threat landscape." Critical Studies on Security 3, no. 2 (May 4, 2015): 147–61. http://dx.doi.org/10.1080/21624887.2015.1071165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sahrom Abu, Md, Siti Rahayu Selamat, Aswami Ariffin, and Robiah Yusof. "Cyber Threat Intelligence – Issue and Challenges." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 1 (April 1, 2018): 371. http://dx.doi.org/10.11591/ijeecs.v10.i1.pp371-379.

Full text
Abstract:
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
APA, Harvard, Vancouver, ISO, and other styles
17

Ali, Rashid. "Looking to the future of the cyber security landscape." Network Security 2021, no. 3 (March 2021): 8–10. http://dx.doi.org/10.1016/s1353-4858(21)00029-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Horan, Cecelia, and Hossein Saiedian. "Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions." Journal of Cybersecurity and Privacy 1, no. 4 (September 30, 2021): 580–96. http://dx.doi.org/10.3390/jcp1040029.

Full text
Abstract:
As technology has become pivotal a part of life, it has also become a part of criminal life. Criminals use new technology developments to commit crimes, and investigators must adapt to these changes. Many people have, and will become, victims of cybercrime, making it even more important for investigators to understand current methods used in cyber investigations. The two general categories of cyber investigations are digital forensics and open-source intelligence. Cyber investigations are affecting more than just the investigators. They must determine what tools they need to use based on the information that the tools provide and how effectively the tools and methods work. Tools are any application or device used by investigators, while methods are the process or technique of using a tool. This survey compares the most common methods available to investigators to determine what kind of evidence the methods provide, and which of them are the most effective. To accomplish this, the survey establishes criteria for comparison and conducts an analysis of the tools in both mobile digital forensic and open-source intelligence investigations. We found that there is no single tool or method that can gather all the evidence that investigators require. Many of the tools must be combined to be most effective. However, there are some tools that are more useful than others. Out of all the methods used in mobile digital forensics, logical extraction and hex dumps are the most effective and least likely to cause damage to the data. Among those tools used in open-source intelligence, natural language processing has more applications and uses than any of the other options.
APA, Harvard, Vancouver, ISO, and other styles
19

Choo, Kim-Kwang Raymond. "The cyber threat landscape: Challenges and future research directions." Computers & Security 30, no. 8 (November 2011): 719–31. http://dx.doi.org/10.1016/j.cose.2011.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bhangoo, Har Sandeep Kaur. "Book review: Ramnath Reghunadhan, 2022. Cyber Technological Paradigms and Threat Landscape in India." Millennial Asia 13, no. 3 (November 11, 2022): 532–35. http://dx.doi.org/10.1177/09763996221128209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Sparke, Matthew. "Situated Cyborg Knowledge in Not so Borderless Online Global Education: Mapping the Geosocial Landscape of a MOOC." Geopolitics 22, no. 1 (July 11, 2016): 51–72. http://dx.doi.org/10.1080/14650045.2016.1204601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wang, Shi Ying, and Xiu Li Jia. "Effect of Landscape Architecture in the Campus Construction." Applied Mechanics and Materials 584-586 (July 2014): 717–20. http://dx.doi.org/10.4028/www.scientific.net/amm.584-586.717.

Full text
Abstract:
one of the five major elements of landscape architecture aslandscape composition, play an important role in the landscape construction, but as the ancient buildings, ancient garden expert Mr. Chen Congzhou said, now the garden construction "to hold the hammer poolroad, the main building anti falls behind, at the end of a garden, then thegold, there is no shelter of visitors, and inversion, and then becom the empty garden." The same, most areas in landscape construction, do not focus on the construction of landscape architecture, especially ignoring theconstruction and function of landscape architecture in the courtyard of the building, the project through building of my school and some colleges and universities in landscape architecture construction in the university campusand the cultural atmosphere and the influence on Students' moral quality,field investigation, student interviews, and through cyber source, library materials, the aliases School of landscape architecture in the campus landscape, culture, moral role analysis, explore the role of landscape,landscape architecture in campus culture, moral construction, in order tolater in the campus construction drawing.
APA, Harvard, Vancouver, ISO, and other styles
23

Dhirani, Lubna Luxmi, Eddie Armstrong, and Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap." Sensors 21, no. 11 (June 5, 2021): 3901. http://dx.doi.org/10.3390/s21113901.

Full text
Abstract:
Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel approach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.
APA, Harvard, Vancouver, ISO, and other styles
24

Clair, Allison, and Jim Mandler. "Building relationships with the new media in a cyber landscape." Journal of Business Strategy 40, no. 6 (November 18, 2019): 49–54. http://dx.doi.org/10.1108/jbs-08-2019-0154.

Full text
Abstract:
Purpose What industry has not changed in the past quarter century because of The Digital Age? The purpose of this paper is to discuss the effect of the digital age on media. Design/methodology/approach This paper takes the design of an author viewpoint. Findings The Digital Age has affected practically everything that makes up our professional and personal lives – how we learn, how we inform, how we sustain and, certainly, how we interact. Originality/value Even industries that previously had no connection to the digital world cannot function.
APA, Harvard, Vancouver, ISO, and other styles
25

Rodofile, Nicholas R., Kenneth Radke, and Ernest Foo. "Extending the cyber-attack landscape for SCADA-based critical infrastructure." International Journal of Critical Infrastructure Protection 25 (June 2019): 14–35. http://dx.doi.org/10.1016/j.ijcip.2019.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lanzendorfer, Quinn E. "Information Sharing Challenges in Government Cybersecurity Organizations." International Journal of Cyber Research and Education 2, no. 1 (January 2020): 32–39. http://dx.doi.org/10.4018/ijcre.2020010103.

Full text
Abstract:
Cyber-attacks happen faster and more spontaneously than traditional warfare. This cyber landscape offers new challenges to organizations due to its unique nature. Building organizations to defend against cyber terrorism and innovating offensive solutions calls for strong information sharing amongst government and military organizations, as well as industry partners. Using an innovative electronic method to collect quantitative and qualitative data from experts, this study seeks to explore the effectiveness and establishment of information sharing practices and procedures in U.S. government cybersecurity organizations. This study also considers the impact of media leaks and terrorism on information sharing practices and procedures.
APA, Harvard, Vancouver, ISO, and other styles
27

McIntosh, Jacqueline, Bruno Marques, Madeleine Palmer, and Verarisa Ujung. "The Outside In." Enquiry A Journal for Architectural Research 16, no. 1 (July 29, 2019): 1–14. http://dx.doi.org/10.17831/enq:arcc.v16i1.445.

Full text
Abstract:
Degradation of ecosystem services, scarcity of resources and the erosion of the planet’s capability to absorb waste is of immediate concern. This situation is novel in its speed, its global and local scale and its threat to the planet and its people. Inspired by the recent discourse of the Anthropocene, this paper explores the convergence of human and nature as they confront generative and destructive forces in two distinctly different settings. Using a case-study approach, this paper adopts the cyborg landscape as a conceptual framework to address the interconnectedness of systems, and scale and poetic brief to accommodate the environment while supporting the needs of our contemporary society. By using nature’s generative capacities as well as its destructive tendencies and by blurring the disciplinary boundaries between interior architecture and landscape architecture, this paper considers two different locations in New Zealand: a post-industrial site on Auckland’s urban waterfront and a remote active volcanic site located on White Island. It finds opportunity to examine intensified inhabitation through acts of immersion and extraction in the “new normal” where nature’s interrelated systems and the artifice of the Anthropocene create innovative and dynamic possibilities. It concludes that the creation of a link between natural processes and responsive technologies can provide solutions to address the complexity of climate change.
APA, Harvard, Vancouver, ISO, and other styles
28

Lambi, Amit, Rashmi Agarwal, and Sandeep Vijayaraghvan. "Cross-Domain Deterrence in the Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 387–91. http://dx.doi.org/10.22214/ijraset.2022.46645.

Full text
Abstract:
Abstract: Cyber Space, like outer space, is strategically a vital domain for state offence and defence. However, there has been a substantial rise in the sponsored cyber activities to inflict heavy losses to critical infrastructures due to the lack of rules or norms or any strict international regulations to govern the conflicts in cyberspace. This activity affects the national defence strategies when oppressed by the response crisis and hugely impacts the risk factors. In these circumstances, the dilemma is whether any operative or offensive choice in the event of a cyber threat or cyber-attack violates international law. War has always been a last resort when other forms of punishment have failed, but the power dynamic has fundamentally shifted since World War II. State Governments have been hoarding the arsenals that could destroy cities in a second; hence a need for unconventional resolution has led to the evolving nature of deterrence. States must reconsider alternate strategies to protect their sovereignty by implementing cross-domain deterrence that can cripple an adversary economy, swift surgical strike as retaliation, or curb the attack using counterintelligence. The threat landscape in Cyber Space is beyond frontiers, and the consequences cannot be contained at the perimeter by the regular armed forces. Require special forces and strategies to mitigate the risks. Cross-Domain deterrence to increase cyber resilience, it is crucial to identify existing strategy disparities to take necessary actions on the state misconduct and the misconduct of a policy for global cooperation during state-sponsored cyberattacks. This paper discusses the evolving framework by assessing the changing threat landscape and its associated risks.
APA, Harvard, Vancouver, ISO, and other styles
29

Muhammad Shairoze Malik, Muhammad Shairoze Malik. "Cyber Security - Incident Response and Management." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 6. http://dx.doi.org/10.54692/ijeci.2019.030337.

Full text
Abstract:
Today, Information Technology has bought a lot of benefits for the mankind but it has also made us susceptible to failures and attacks as well. This article discusses the increasing complexity of cyber- security threats and capabilities of information security teams in applying controls required to effectively respond to threats. In this article, the main stages of managing information security incidents and events are discussed, designed to help create an effective response process to security incidents and as a result to reduce losses and quickly restore performance in dynamically changing IT infrastructure and threat landscape.
APA, Harvard, Vancouver, ISO, and other styles
30

Muhammad Shairoze Malik, Muhammad Shairoze Malik. "Cyber Security - Incident Response and Management." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 6. http://dx.doi.org/10.54692/ijeci.2020.030337.

Full text
Abstract:
Today, Information Technology has bought a lot of benefits for the mankind but it has also made us susceptible to failures and attacks as well. This article discusses the increasing complexity of cyber- security threats and capabilities of information security teams in applying controls required to effectively respond to threats. In this article, the main stages of managing information security incidents and events are discussed, designed to help create an effective response process to security incidents and as a result to reduce losses and quickly restore performance in dynamically changing IT infrastructure and threat landscape.
APA, Harvard, Vancouver, ISO, and other styles
31

Lopatova, Natalia. "Cybersecurity as a driver of business growth." Science and Innovations 3, no. 217 (March 2021): 38–41. http://dx.doi.org/10.29235/1818-9857-2021-3-38-41.

Full text
Abstract:
The article considers cybersecurity as an opportunity for further business growth and a source of competitive advantage. The main cyber risks that can lead to serious and destructive consequences for companies are identified. The article substantiates the need for strategic management of risks arising in the information space against the background of expanding the cyber threat landscape, as well as an integrated approach to making investment decisions in the field of cybersecurity. The key aspects of forming effective information security programs are identified.
APA, Harvard, Vancouver, ISO, and other styles
32

Boyko, Taras, and Mariya Ruda. "Cyber-physical system for assessing the impact of wind farms on environmental elements." Ukrainian Metrological Journal, no. 1 (March 31, 2021): 60–66. http://dx.doi.org/10.24027/2306-7039.1.2021.228245.

Full text
Abstract:
The article assesses the impact of wind power plants on the components of the environment, which are compartments of complex landscape systems, taking into account a number of their parameters. A list of impact categories has been made up, which represent the load on the environment; also, for each category, the relative contribution of harmful factors has been identified, taking into account possible scenarios for waste management. For all potential impacts, using the Eco-indicator methodology, ecological profiles have been built, which made it possible to obtain the values of ecological indexes (impacts) and eco-indicators, expressed in eco-points, characterizing the impact of the wind power plant under study. Mathematical modeling of the processes of influence of a separate wind power plant on the subsystems and layers of compartments was carried out, according to the results of which a system of differential equations has been obtained, the input data for which are individual indexes and eco-indicators, as well as statistical information on the functioning of the elements of the hierarchical structure of compartments of a complex landscape system. The structure graphs are formalized using the Kolmogorov system of differential equations. It is proposed to study the dynamics of the structure on the basis of solving a system of differential equations using the fourth-order numerical Runge – Kutta method. By solving the system of equations, it is possible to study (predict) the developmental stages of a complex landscape system in dynamic and stationary modes during the impact of the life cycle of wind turbines on the subsystems and layers of their compartments, in order to optimize human activities to ensure minimal environmental impact. It is proposed to use the presented algorithms as a mathematical support for a cyber-physical system for studying the states of complex landscape systems and assessing the impact of wind turbines on environmental components. Keywords: cyber-physical system; renewable energy sources; complex landscape system; life cycle, ecosystem states; eco-points
APA, Harvard, Vancouver, ISO, and other styles
33

Mittel, Michael. "Navigating the cyber-insurance landscape to protect MSPs and their clients." Computer Fraud & Security 2020, no. 1 (January 2020): 12–14. http://dx.doi.org/10.1016/s1361-3723(20)30008-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Vogel, Elisabeth, Zoya Dyka, Dan Klann, and Peter Langendörfer. "Resilience in the Cyberworld: Definitions, Features and Models." Future Internet 13, no. 11 (November 19, 2021): 293. http://dx.doi.org/10.3390/fi13110293.

Full text
Abstract:
Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitions provided by different authors, on different years and with different application areas the field of computer science/computer engineering. We identify the core statements that are more or less common to the majority of the definitions, and based on this we give a holistic definition using attributes for (cyber-) resilience. In order to pave a way towards resilience engineering, we discuss a theoretical model of the life cycle of a (cyber-) resilient system that consists of key actions presented in the literature. We adapt this model for embedded (cyber-) resilient systems.
APA, Harvard, Vancouver, ISO, and other styles
35

Rashid, Asma, Anum Yar Khan, and Syed Wasif Azim. "Cyber hegemony and information warfare: A case of Russia." Liberal Arts and Social Sciences International Journal (LASSIJ) 5, no. 1 (June 30, 2021): 648–66. http://dx.doi.org/10.47264/idea.lassij/5.1.42.

Full text
Abstract:
The world has shifted to a digital landscape in the recent decade with both its perks and underlying threats. Russia, throughout history has experimented with its information along with cyber channels and have been able to generate fruitful results that are manifested in the contemporary era. Russian expertise towards merging cyber domain into its military capabilities is praiseworthy to the point that its Western adversaries, despite the fact being economically and technologically advanced compared to Russia, have not been able to effectively counter Russian aggression. This research examines the essentiality of cyber security as a mere software or cyber command can create instability and drastic consequences requiring millions for clean-up by examining Russian cyber-attacks on Estonia, Georgia, Ukraine, US and Western Europe and concludes that the first steps towards Cyber and Information Warfare have been made, it is now to be made sure this does not escalate into a Cyber Arms Race. The research recommends that cyber security should be treated as an international issue with rules established for cyber governance and databases identifying cyber criminals and the software used by them or can be used by them and requires cooperation rather than competition amongst states particularly global superpowers.
APA, Harvard, Vancouver, ISO, and other styles
36

Essien, Essien D. "Ethical Implications of the Techno-Social Dilemma in Contemporary Cyber-Security Phenomenon in Africa." International Journal of Information Communication Technologies and Human Development 10, no. 1 (January 2018): 17–30. http://dx.doi.org/10.4018/ijicthd.2018010102.

Full text
Abstract:
This article examines the cyber security dimension of the global information Infrastructure which has resulted in the attainment of remarkable milestones and unlimited opportunities. However, these benefits notwithstanding, the cyberspace is increasingly under attack by cybercriminals, and the cost and damages from such attacks are increasing alarming. This article therefore, sets out to examine the ethical implications of cybersecurity phenomenon. Relying upon an extensive contemporary literature on cyber security, this study examines the phenomenon using the protection motivation theory. The article employs qualitative analysis of the current cybersecurity landscape in Nigeria. With an insight provided into understanding the independent layers of cyber security in Nigeria, a criterion on what should constitute appropriate procedure for cyber security is thus supplied. Findings posit that with the vulnerability of cyberspace, cyber security phenomenon in Africa, mirrors the existing social inequalities and widens the social division that is more apparent with the expansion of the ICTs.
APA, Harvard, Vancouver, ISO, and other styles
37

Butnaru, Denisa. "Exoskeletons, Rehabilitation and Bodily Capacities." Body & Society 27, no. 3 (July 21, 2021): 28–57. http://dx.doi.org/10.1177/1357034x211025600.

Full text
Abstract:
Motility impairments resulting from spinal cord injuries and cerebrovascular accidents are increasingly prevalent in society, leading to the growing development of rehabilitative robotic technologies, among them exoskeletons. This article outlines how bodies with neurological conditions such as spinal cord injury and stroke engage in processes of re-appropriation while using exoskeletons and some of the challenges they face. The main task of exoskeletons in rehabilitative environments is either to rehabilitate or ameliorate anatomic functions of impaired bodies. In these complex processes, they also play a crucial role in recasting specific corporeal phenomenologies. For the accomplishment of these forms of corporeal re-appropriation, the role of experts is crucial. This article explores how categories such as bodily resistance, techno-inter-corporeal co-production of bodies and machines, as well as body work mark the landscape of these contemporary forms of impaired corporeality. While defending corporeal extension rather than incorporation, I argue against the figure of the ‘cyborg’ and posit the idea of ‘residual subjectivity’.
APA, Harvard, Vancouver, ISO, and other styles
38

Boyko, Taras, Mariia Ruda, Serhiy Stasevych, and Olha Chaplyk. "THE WIND TURBINE AND THE ENVIRONMENT INTERACTION MODEL." Measuring Equipment and Metrology 82, no. 4 (2021): 51–60. http://dx.doi.org/10.23939/istcmtm2021.04.051.

Full text
Abstract:
The modeling of the mutual influence of the wind power plant and the ecosystem is carried out. It is proposed to consider the compartment of a complex landscape complex as an elementary structural element of the ecosystem. The wind power plant is a component of a complex landscape complex and is considered during its life cycle. The categories of environmental impact and the relative contribution of harmful factors for each category have been determined. The modeling was carried out using various scenarios of waste management, which will make it possible to reduce the negative impact of harmful factors for each category. Summary data on the impact of harmful factors on the environment were obtained, and ecological profiles were constructed using the Eco-indicator methodology. Such profiles, together with the weighting factors, allow a comprehensive presentation of environmental impacts and obtaining the values of eco-indicators that characterize the damage caused by a wind turbine to the environment. The process of synthesis of an industrial cyber-physical system is carried out by five typical steps, among which the process of ‘cyber-realization’ is to create a cyber twin and compare it with the real system. To implement this process, mathematical modeling was carried out, as a result of which a system of differential equations was obtained, the input data for which were the values of environmental impacts, expressed by the specified indicators. The resulting model will act as ideal for a real system ‘wind turbine – environment”, and will allow predicting the consequences of the harmful impact of a wind turbine on a complex landscape system and will determine the main impacts to achieve its maximum efficiency and adaptation to the requirements for environmental protection and conservation. Some results obtained using the developed model are presented.
APA, Harvard, Vancouver, ISO, and other styles
39

Rajaram, Priyanga, Mark Goh, and Jianying Zhou. "Guidelines for cyber risk management in shipboard operational technology systems." Journal of Physics: Conference Series 2311, no. 1 (July 1, 2022): 012002. http://dx.doi.org/10.1088/1742-6596/2311/1/012002.

Full text
Abstract:
Abstract Over the past few years, we have seen several cyber incidents being reported, where some of the primary causes were the lack of proper security controls onboard the ship and crew awareness on cybersecurity. In response to the growing cyber threat landscape in the maritime sector, we have developed a set of guidelines for maritime cyber risk management, focusing on four major shipboard Operational Technology (OT) systems that are crucial for the day-to-day operation of ships. These four OT systems are: Communication Systems, Propulsion, Machinery and Power Control Systems, Navigation Systems and Cargo Management Systems. The guidelines identify the cyber risks in each of the OT systems and recommend the necessary actions that can be taken to manage risks in each shipboard OT system. In this paper, we introduce the new guidelines, which include cyber risks, mitigation measures, cyber risk assessment, and a checklist to help shipowners and maritime authorities assess and enhance cyber hygiene of their vessels. Our guidelines have been disseminated by the Maritime and Port Authority of Singapore (MPA) to owners and operators of the Singapore Registry of Ships for their reference and use.
APA, Harvard, Vancouver, ISO, and other styles
40

Sreeja, T., Dr Manna Sheela Rani Chetty, and Sekhar Babu Boddu. "Detecting SQL Injection Using Correlative Log Analysis." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 389. http://dx.doi.org/10.14419/ijet.v7i2.32.15720.

Full text
Abstract:
The spiking landscape of cyber-attacks is reflecting its trend towards invoking vulnerabilities in a web application. The vulnerabilities seem to be over-growing second by second beside being over-coming time to time. The reason behind is, new attack vectors are often being deployed by the threat actors. The global cyber security market alone has brought a turnover of about $350 billion, which shows how wide the attack landscape is and how expensive it is to detect, protect and respond to the cyber issues. Most of the security experts have quoted that, the average cost of a data breach will exceed to $150million by 2020 and about 80 percent of the global demography were nowhere aware of such attacks. From the past few years, SQL injection is acting as a major vector in breaching the sensitive data. Detecting SQL injection through log correlation is the most effective methodology utilized under adaptive environments seeking no tool investigation. This paper exposes a detection methodology of an SQL injection attack without any mere concentration on automated tools. The paper goes with a motto of detection through configuring the available resources like web server,database,and an IDS in a way of creating adaptable environment that can bring the entire attacker information through log analysis. The paper would represent the attacker phases in a finite automata.
APA, Harvard, Vancouver, ISO, and other styles
41

Et.al, Sandhya Sukhabogi. "A Theoretical review on the importance of Threat Intelligence Sharing & The challenges intricated." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3950–56. http://dx.doi.org/10.17762/turcomat.v12i3.1684.

Full text
Abstract:
Cyber Threat Intelligence (CTI) is the emerging strategy of cyber defense which helps organizations to combat the latest and more sophisticated cyber threats. Gathering this threat information, analyzing and communicating it between the security teams is very difficult and challenging because of the heterogeneous aspects involved. The necessity of sharing the intelligence related data collected by organizations is increasing day by day to counter the ever changing and highly dynamic threat landscape. In this paper an attempt is made to understand CTI concept and how it is collected and analyzed to form useful actionable intelligence are observed. The importance of Threat intelligence sharing, and various standards working in the area of TIS are also mentioned. Finally the primary challenges in TIS are given a light in a broad view
APA, Harvard, Vancouver, ISO, and other styles
42

Slack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATO’s Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.

Full text
Abstract:
For nearly seventy years, NATO has been used as a forum for its Allies to consult, co-operate, and act on the decisions taken collectively for the benefit of their security and defence. Against the backdrop of a rapidly evolving cyber threat landscape, the Alliance has taken a number of steps in recent years to bolster its cyber defences, recognizing that cyber defence forms a part of NATO’s core task of collective defence. This article will shed light on NATO’s approach to cultivating co-operation on cyber defence – among Allies but also with a broad partnership network of countries, international organizations, industry and academia. Specific initiatives that are being pursued by the Allies to support NATO’s broader deterrence and defence, enhance national cyber resilience, and collaborate with partners in a spirit of co-operative security will be explored. In the end, these activities contribute to ensuring thatNATOcontinues to adapt and remain fit for purpose as a platform for consultation and action on collective security in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
43

Dreibelbis, Rachel C., Jaclyn Martin, Michael D. Coovert, and David W. Dorsey. "The Looming Cybersecurity Crisis and What It Means for the Practice of Industrial and Organizational Psychology." Industrial and Organizational Psychology 11, no. 2 (June 2018): 346–65. http://dx.doi.org/10.1017/iop.2018.3.

Full text
Abstract:
The persistently changing landscape of cyberspace and cybersecurity has led to a call for organizations’ increased attention toward securing information and systems. Rapid change in the cyber environment puts it on a scale unlike any other performance environment typically of interest to industrial and organizational (I-O) psychologists and related disciplines. In this article, we reflect on the idea of keeping pace with cyber, with a particular focus on the role of practicing I-O psychologists in assisting individuals, teams, and organizations. We focus on the unique roles of I-O psychologists in relation to the cyber realm and discuss the ways in which they can contribute to organizational cybersecurity efforts. As highlighted throughout this article, we assert that the mounting threats within cyberspace amount to a “looming crisis.” Thus, we view assisting organizations and their employees with becoming resilient and adaptive to cyber threats as an imperative, and practicing I-O psychologists should be at the forefront of these efforts.
APA, Harvard, Vancouver, ISO, and other styles
44

Wilner, Alex S. "Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation." International Journal: Canada's Journal of Global Policy Analysis 73, no. 2 (June 2018): 308–16. http://dx.doi.org/10.1177/0020702018782496.

Full text
Abstract:
The future of cybersecurity is in flux. Artificial intelligence challenges existing notions of security, human rights, and governance. Digital misinformation campaigns leverage fabrications and mistruths for political and geostrategic gain. And the Internet of Things—a digital landscape in which billions of wireless objects from smart fridges to smart cars are tethered together—provides new means to distribute and conduct cyberattacks. As technological developments alter the way we think about cybersecurity, they will likewise broaden the way governments and societies will have to learn to respond. This policy brief discusses the emerging landscape of cybersecurity in Canada and abroad, with the intent of informing public debate and discourse on emerging cyber challenges and opportunities.
APA, Harvard, Vancouver, ISO, and other styles
45

Swart, Ignatius, Barry Irwin, and Marthie M. Grobler. "Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion." International Journal of Cyber Warfare and Terrorism 6, no. 3 (July 2016): 17–30. http://dx.doi.org/10.4018/ijcwt.2016070102.

Full text
Abstract:
The potential attack surface of a nation is large and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a nation. There are a variety of specialised data sources available to assess the state of a nation in key areas such as botnets, spam servers and incorrectly configured hosts. By applying data fusion principles, the potential exists to provide a representative view of all combined data sources. This research will examine a variety of currently available Internet data sources and apply it to an adapted Joint Directors of Laboratories (JDL) data fusion model in order to illustrate the potential gains and current limitations. The JDL model has been adapted to suit national level cyber sensor data fusion with the aim to formally define and reduce data ambiguity and enhance fusion capability in a real world system. A case study highlights the results of applying available open source security information against the model to relate to the current South African cyber landscape.
APA, Harvard, Vancouver, ISO, and other styles
46

Smyrlis, Michail, Iason Somarakis, George Spanoudakis, George Hatzivasilis, and Sotiris Ioannidis. "CYRA: A Model-Driven CYber Range Assurance Platform." Applied Sciences 11, no. 11 (June 2, 2021): 5165. http://dx.doi.org/10.3390/app11115165.

Full text
Abstract:
Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet of Things. However, mainstream and sophisticated attacks are remaining a threat, both for individuals and organisations. Cyber Range emerges as a promising solution to effectively train people in cybersecurity aspects. A Training Programme is considered adequate only if it can adapt to the scope of the attacks they cover and if the trainees apply the learning material to the operational system. Therefore, this study introduces the model-driven CYber Range Assurance platform (CYRA). The solution allows a trainee to be trained for known and new cyber-attacks by adapting to the continuously evolving threat landscape and examines if the trainees transfer the acquired knowledge to the working environment. Furthermore, this paper presents a use case on an operational backend ICT system, showing how the CYRA platform was utilised to increase the security posture of the organisation.
APA, Harvard, Vancouver, ISO, and other styles
47

Schmitz-Berndt, Sandra, and Mark Cole. "Towards an Efficient and Coherent Regulatory Framework on Cybersecurity in the EU: The Proposals for a NIS 2.0 Directive and a Cyber Resilience Act." Applied Cybersecurity & Internet Governance 1, no. 1 (December 8, 2022): 121–37. http://dx.doi.org/10.5604/01.3001.0016.1323.

Full text
Abstract:
Cybersecurity regulation in the EU has long been implemented in a piecemeal fashion resulting in a fragmented regulatory landscape. Recent developments triggered the EU to review its approach which has not resulted in the envisaged high level of cyber resilience across the Union. The paper addresses the EU’s limited mandate to regulate cybersecurity and outlines how the internal market rationale serves as a basis to harmonise cybersecurity legislation in the EU Member States. In that regard, the recent Proposal for a NIS 2.0 Directive and the Cyber Resilience Act highlight how the EU seeks to align legislation and reduce complexity between different, often sectoral regulatory approaches to cybersecurity, while at the same time extending regulation in a view to achieve a high level of cybersecurity across the EU. As regards the latter, the paper also outlines how the Cyber Resilience Act will complement the NIS 2.0 Directive in order to close existing regulatory gaps.
APA, Harvard, Vancouver, ISO, and other styles
48

MANANTAN, MARK BRYAN. "The People’s Republic of China’s Cyber Coercion: Taiwan, Hong Kong, and the South China Sea." Issues & Studies 56, no. 03 (September 2020): 2040013. http://dx.doi.org/10.1142/s1013251120400135.

Full text
Abstract:
This paper investigates the increasing use of cyber coercion by the People’s Republic of China (PRC) among its core interests: Taiwan, Hong Kong, and the South China Sea. It argues that the PRC’s deployment of sophisticated attacks in the form of cyber coercion continues to be part of its geostrategic playbook to exert its influence and prosecute its wider interests as a rising power in the Indo-Pacific region. However, it observes that cyber coercion will be employed by the PRC in concert with all the other tools — diplomatic, economic, and the political — across the spectrum. The paper has two broad goals: first to unpack the trends or patterns in the PRC-sponsored cyber coercion by accentuating contextual and operational dimensions using Taiwan, Hong Kong, and the South China Sea as analytical case studies; second, to highlight the opportunities and limitations of using cyber coercion as an asymmetrical capability in the changing threat landscape. The paper concludes that the PRC’s cyber coercion is characterized by blurring the distinction on what constitutes compellence and deterrence. The boundaries are not clear cut, and to a certain degree both are even mutually reinforcing. The in-depth analysis of the case studies reveals the growing prominence of disinformation campaigns in close coordination with cyber operations (malware, phishing, and DDoS attack). This emboldens the PRC with a myriad of coercive strategies in shaping its external environment and realizing its ambition of national rejuvenation across Taiwan, Hong Kong, and the South China Sea.
APA, Harvard, Vancouver, ISO, and other styles
49

Kalogeraki, Eleni-Maria, Spyridon Papastergiou, Haralambos Mouratidis, and Nineta Polemi. "A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments." Applied Sciences 8, no. 9 (August 28, 2018): 1477. http://dx.doi.org/10.3390/app8091477.

Full text
Abstract:
In recent years maritime logistics infrastructures are the global links among societies and economies. This challenges adversaries to intrude on the cyber-dependent ICTs by performing high-level intelligent techniques. A potential cyber-attack on such infrastructures can cause tremendous damages starting from supply chain service disruption ending up with threatening the whole human welfare. Current risk management policies embed significant limitations in terms of capturing the specific security requirements of ICTs and control/monitoring devices, such as IoT platforms, satellites and time installations, which are primary functioning for the provision of Maritime Logistics and Supply Chain (MLoSC) services. This work presents a novel risk assessment methodology capable of addressing the security particularities and specificities of the complex nature of SCADA infrastructures and Cyber-Physical Systems (CPSs) of the Maritime Logistics Industry. The methodology identifies asset vulnerabilities and threats to estimate the cyber-risks and their cascading effects within the supply chain, introducing a set of subsequent security assessment services. The utilization of these services is demonstrated via a critical, real-life SCADA scenario indicating how they can facilitate supply chain operators in comprehending the threat landscape of their infrastructures and guide them how to adopt optimal mitigation strategies to counter or eliminate their cyber-risks.
APA, Harvard, Vancouver, ISO, and other styles
50

Păvălașcu, Narcis Sebastian, and Manuela Rozalia Gabor. "A Case Study on the Particularities and Sustainability of the Concepts of TQM, Quality Control, and Risk Management in the Corporate Insurance Industry: Loss and the Incidence of Catastrophic Risks." Proceedings 63, no. 1 (December 10, 2020): 3. http://dx.doi.org/10.3390/proceedings2020063003.

Full text
Abstract:
The development of quality control and risk management systems is a priority for any industry and especially for the corporate insurance industry. Defective product and work incidents represent 14% of the total number of insurance claims, serving as the main loss of liability for businesses. According to a Allianz Global Corporate and Specialty press release, the cyber risks and impact of new technologies will have an increasing influence on the landscape of corporate losses in the coming years. Our results from this study conclude that the emerging business risks for the next 3–4 years are as follows: cyber incidents, 48%; new technologies, 30%; and changes in legislations/regulations, 28% (i.e., the present pandemic cause by COVID-19, the Brexit, trade wars, and tariffs etc.).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography