The distributed nature of the Internet requires that security issues be addressed through collaborative efforts within and across various sets of public and private actors. Drawing on nodal governance theory, this article explores one aspect of the role that the general public can and does play in the field of cyber-security: civilian policing of the Internet. In particular, we examine the motives and actions of regular citizens, who use their computer skills to identify, track and collect information on the activities of suspected criminal offenders. Whereas some groups use such information to engage in vigilante acts, the groups that we study work cooperatively with police, collecting information to pass onto criminal justice agencies. We suggest that these collectives and their members are a potentially useful, if under-valued, component of cyber-security networks.
Examining assumptions about dependence and influence in the U.S. security cooperation enterprise.
CyberArk 2024 Identity Security Threat Landscape Report is a global survey of 2,400 security decision-makers across 18 countries that examines how cyberattacks impact identity.
This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (hereinafter NIS2).
The report aims at providing policy makers at EU level with an evidence-based overview of the state of play of the cybersecurity landscape and capabilities at the EU, national and societal levels, as well as with policy recommendations to address identified shortcomings and increase the level of cybersecurity across the Union.
The need for security is human nature and instinct It is about our survival and security. Humans have practiced it as a natural reaction to our surroundings. Historically, physical security has existed in the earh'est known forms of prehistoric civilizations. Many traditional principles and practices are still used and valid. What has changed is technology. Technology can be apph'ed as a powerful tool in well-conceived physical security programs as well as the cybersecurity Geld. Fundamental security concepts and their practical measures are as old as human beings' nature for survival and protection, as well as new technologies that are improving these basic concepts and apph'cations. The world of computers and information are constantly changing. Change exposes vulnerabilities. Security and IT professionals are facing challenges and problems targeting cyberspace and organization's information by gaining unauthorized access to breach security lines. Both traditional security professionals and technology-oriented IT and cybersecurity professionals must work together to protect the organizations and the individuals they serve by utilizing and applying the same principles of layered security protection lines in both physical and cyber worlds. © 2020 International Journal of Cyber Criminology.
Research firm Vanson Bourne surveyed 1,000 cybersecurity professionals in Australia, Brazil, Canada, France, Germany, India, Japan, the U.K and the U.S. across a variety of sectors. It gauged the demographics of those in the cybersecurity field, their motivators and frustration in the field, the career development pathways, and ideas for expanding the ranks of the workforce to include those with non-traditional career pathways.
This paper aims to systematically summarize different methods and techniques and to review corresponding solution approaches in cyber-security in energy systems. In the first step, we discuss the interactive features of cyber-security; then, their modeling and mechanisms are reviewed and summarized in detail. Furthermore, the characteristics and applicability of different cyber-attack models are technically discussed and analyzed. The cutting-edge cyber security approaches such as blockchain and quantum computing in SGs and power systems are stated, and recent research directions are highlighted. The decisive problem-solving approaches and defense mechanisms are presented. Finally, some points regarding the role of cyber-security in the future of SGs are presented.
The article is of strategic nature. It projects the importance of cyber-security as policy, while reflecting the need for enhancing constantly NATO’s (North Atlantic Treaty Organization) cyber-dimensional strategy, management, and operations. There is a policy need for constant innovation and entrepreneurship in security, one that reflects also NATO’s practical needs; its security resilience and business continuity. At a time of strategic challenges and policy recommendations, the production of this article is timely.
In this paper, the power supply reliability is evaluated considering the strategic allocation of defense resources. Specifically, the optimal mixed strategies are formulated by the Stackelberg Security Game (SSG) to allocate the defense resources on multiple targets subject to cyberattacks. The cyberattacks against the intrusion-tolerant Supervisory Control and Data Acquisition (SCADA) system are mathematically modeled by Semi-Markov Process (SMP) kernel. The intrusion tolerance capability of the SCADA system provides buffered residence time before the substation failure to enhance the network robustness against cyberattacks.
We outline a holistic roadmap through the incorporation of multiple interconnected dimensions as the underpinning of cybersecurity risk identification and mitigation. We introduce a novel framework that identifies practical organizational drivers and priorities to improve cyber resiliency within the organizational perspective.