Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 201 - 210 of 357 references
2021 - Tashfiq Rahman, Prasert Kanthamanon, Rohani Rohan, Debajyoti Pal - ACM

Humans are often considered to be the weakest link in the cybersecurity chain. However, traditionally the Computer Science (CS) researchers have investigated the technical aspects of cybersecurity, focusing on the encryption and network security mechanisms. The human aspect although very important is often neglected. In this work we carry out a scoping review to investigate the take of the CS community on the human-centric cybersecurity paradigm by considering the top conferences on network and computer security for the past six years.

Civilian cybersecurity
2020 - Marian Merritt - National Institute of Standards and Technology

Recommendations from the workshop discussion included concrete suggestions both for the military and for the private sector to do more to streamline a warfighter’s experience from before entering the service all the way through to transitioning to a new civilian cybersecurity
career.

Civilian cybersecurity
2020 - fordham

This project investigates civilians’ vulnerabilities through four
cyber-attacks: (1) the Anthem health insurer cyber-attack in the United States, (2) WannaCry ransomware on the National Health Service in the United Kingdom, (3) the Jasmine Revolution cyber-attacks in Tunisia, and (4) the 2010 Natanz uranium enrichment facility cyber-attacks in
Iran.

Civilian cybersecurity
2017 - K.P. Vijayalakshmi - SAGE Publications

India–US relationship oscillated unevenly due to the politics of the Cold War. Post-Cold War, both countries have taken gradual, positive steps towards each other. While President Bill Clinton established a tilt towards India during his second term, George Bush ushered a transformational shift in the relationship that led to the Next Steps in Strategic Partnership and eventually to the path-breaking Civil Nuclear Cooperation Agreement. Since then relations have been steadily improving with the Obama presidency moving in the same direction. The joint incentives for New Delhi and Washington have ranged from counterterrorism, defence cooperation, cyber security, trade and economics, agriculture, education and science and technology cooperation. Apart from the interest of mutual gains, the relationship was further influenced by the enormous geopolitical changes unfolding in the region. The mutual concern over the ‘peaceful rise’ of China followed by its aggressive foreign policy and active military presence especially in the India Ocean region has created fresh opportunities to both. However, irrespective of the strategic potential of the relationship and the strong political will at both ends, Indo-US ties have their own share of irritants in several spheres. Recognizing the complex narrative of converging and diverging interests functioning under the ambit of strategic partnership, this article examines the constraints and imperatives, and the main determinants that drive the relationship in the post-9/11 era. Various triggers and catalysts in US’ internal policy process apart from the geopolitical factors that led to the growing engagement with India are examined. © 2018 Jawaharlal Nehru University.

Cybersecurity and defense
2021 - Stephen Ugwuanyi, James Irvine - IEEE

This paper analyses the underpinning cybersecurity risks and attack landscape in Industrial IoT (IIoT) and suggests potential countermeasure opportunities for future hybrid IoT applications based on lessons from IIoT projects.

Cybersecurity and defense
2021 - Lubna Luxmi Dhirani, Eddie Armstrong, Thomas Newe - MDPI AG

The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.

Cybersecurity and defense
2021 - Sokratis Nifakos, Panagiotis Papachristou, Krishna Chandramouli, Charoula Konstantina Nikolaou, Emmanouil Panaousis, Stefano Bonacina, Sabine Koch - MDPI AG

Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and WannaCry, have brought to life the destructive nature of such attacks upon healthcare. In complement to cyberattacks, which have been targeted against the vulnerabilities of information technology (IT) infrastructures, a new form of cyber attack aims to exploit human vulnerabilities; such attacks are categorised as social engineering attacks. Following an increase in the frequency and ingenuity of attacks launched against hospitals and clinical environments with the intention of causing service disruption, there is a strong need to study the level of awareness programmes and training activities offered to the staff by healthcare organisations. Objective: The objective of this systematic review is to identify commonly encountered factors that cybersecurity postures of a healthcare organisation, resulting from the ignorance of cyber threat to healthcare. The systematic review aims to consolidate the current literature being reported upon human behaviour resulting in security gaps that mitigate the cyber defence strategy adopted by healthcare organisations. Additionally, the paper also reviews the organisational risk assessment methodology implemented and the policies being adopted to strengthen cybersecurity. Methods: The topic of cybersecurity within healthcare and the clinical environment has attracted the interest of several researchers, resulting in a broad range of literature. The inclusion criteria for the articles in the review stem from the scope of the five research questions identified. To this end, we conducted seven search queries across three repositories, namely (i) PubMed®/MED-LINE; (ii) Cumulative Index to Nursing and Allied Health Literature (CINAHL); and (iii) Web of Science (WoS), using key words related to cybersecurity awareness, training, organisation risk assessment methodologies, policies and recommendations adopted as counter measures within health care. These were restricted to around the last 12 years.

Civilian cybersecurity
2019 - Christian Reuter - Springer Fachmedien Wiesbaden

Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and security.

Dual-use cybersecurity
2016 - INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE

In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies (ICT) are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic level and adapt themselves to live or operate in that new form of environment. When we consider a country' cybersecurity efforts as a whole, it starts with individuals at the bottom, institutions, firms and military organizations at middle and government at the top. Ensuring a robust cybersecurity policy in a country, requires all levels (individual, institution, government) to be at the same standard. While the government level cybersecurity strategy documents generally present a comprehensive approach, the institutional level cybersecurity roadmaps, action plans are generally not present or overlooked. Being one of the main elements of a country, military organizations should be prepared to operate in this new form of operational environment that is full of malwares, advanced persistent threats (APT) and cyber espionage software. In this study, institutional cybersecurity from the military perspective is analysed in the light of possible challenges, organizational structure, the military decision making process (MDMP) and cybersecurity workforce.

Civilian cybersecurity
2022 - IJCST

In the evolving landscape of cybersecurity, organizations are constantly seeking robust frameworks to protect their assets from a myriad of threats. The Zero Trust Architecture (ZTA) and Layered Security Model (LSM) emerge as two paramount paradigms that address these concerns. Zero Trust, as the name suggests, operates on a foundational principle of "Never Trust, Always Verify." It posits that trust should not be inherently granted based on location (inside or outside the organizational perimeter) but should be established through rigorous verification processes. This approach emphasizes the importance of continuous validation of entities trying to access organizational systems, ensuring that every access request is authenticated, authorized, and encrypted. Complementing the Zero Trust approach is the Layered Security Model, also known as Defense in Depth. This model advocates for multiple layers of defense mechanisms placed throughout an IT system, creating a multi-faceted barrier against potential threats.

Cybersecurity and defense
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.