Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 201 - 210 of 350 references
2021 - Stephen Ugwuanyi, James Irvine - IEEE

This paper analyses the underpinning cybersecurity risks and attack landscape in Industrial IoT (IIoT) and suggests potential countermeasure opportunities for future hybrid IoT applications based on lessons from IIoT projects.

Cybersecurity and defense
2021 - Lubna Luxmi Dhirani, Eddie Armstrong, Thomas Newe - MDPI AG

The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.

Cybersecurity and defense
2021 - Sokratis Nifakos, Panagiotis Papachristou, Krishna Chandramouli, Charoula Konstantina Nikolaou, Emmanouil Panaousis, Stefano Bonacina, Sabine Koch - MDPI AG

Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and WannaCry, have brought to life the destructive nature of such attacks upon healthcare. In complement to cyberattacks, which have been targeted against the vulnerabilities of information technology (IT) infrastructures, a new form of cyber attack aims to exploit human vulnerabilities; such attacks are categorised as social engineering attacks. Following an increase in the frequency and ingenuity of attacks launched against hospitals and clinical environments with the intention of causing service disruption, there is a strong need to study the level of awareness programmes and training activities offered to the staff by healthcare organisations. Objective: The objective of this systematic review is to identify commonly encountered factors that cybersecurity postures of a healthcare organisation, resulting from the ignorance of cyber threat to healthcare. The systematic review aims to consolidate the current literature being reported upon human behaviour resulting in security gaps that mitigate the cyber defence strategy adopted by healthcare organisations. Additionally, the paper also reviews the organisational risk assessment methodology implemented and the policies being adopted to strengthen cybersecurity. Methods: The topic of cybersecurity within healthcare and the clinical environment has attracted the interest of several researchers, resulting in a broad range of literature. The inclusion criteria for the articles in the review stem from the scope of the five research questions identified. To this end, we conducted seven search queries across three repositories, namely (i) PubMed®/MED-LINE; (ii) Cumulative Index to Nursing and Allied Health Literature (CINAHL); and (iii) Web of Science (WoS), using key words related to cybersecurity awareness, training, organisation risk assessment methodologies, policies and recommendations adopted as counter measures within health care. These were restricted to around the last 12 years.

Civilian cybersecurity
2019 - Christian Reuter - Springer Fachmedien Wiesbaden

Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and security.

Dual-use cybersecurity
2016 - INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE

In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies (ICT) are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic level and adapt themselves to live or operate in that new form of environment. When we consider a country' cybersecurity efforts as a whole, it starts with individuals at the bottom, institutions, firms and military organizations at middle and government at the top. Ensuring a robust cybersecurity policy in a country, requires all levels (individual, institution, government) to be at the same standard. While the government level cybersecurity strategy documents generally present a comprehensive approach, the institutional level cybersecurity roadmaps, action plans are generally not present or overlooked. Being one of the main elements of a country, military organizations should be prepared to operate in this new form of operational environment that is full of malwares, advanced persistent threats (APT) and cyber espionage software. In this study, institutional cybersecurity from the military perspective is analysed in the light of possible challenges, organizational structure, the military decision making process (MDMP) and cybersecurity workforce.

Civilian cybersecurity
2022 - IJCST

In the evolving landscape of cybersecurity, organizations are constantly seeking robust frameworks to protect their assets from a myriad of threats. The Zero Trust Architecture (ZTA) and Layered Security Model (LSM) emerge as two paramount paradigms that address these concerns. Zero Trust, as the name suggests, operates on a foundational principle of "Never Trust, Always Verify." It posits that trust should not be inherently granted based on location (inside or outside the organizational perimeter) but should be established through rigorous verification processes. This approach emphasizes the importance of continuous validation of entities trying to access organizational systems, ensuring that every access request is authenticated, authorized, and encrypted. Complementing the Zero Trust approach is the Layered Security Model, also known as Defense in Depth. This model advocates for multiple layers of defense mechanisms placed throughout an IT system, creating a multi-faceted barrier against potential threats.

Cybersecurity and defense
2021 - Rizwan Majeed, Nurul Azma Abdullah, Muhammad Faheem Mushtaq, Muhammad Umer, Michele Nappi - MDPI AG

Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provide a safe and secure network to acquire desired performance. Small drones are finding new paths for progress in the civil and defense industries, but also posing new challenges for security and privacy as well. The basic design of the small drone requires a modification in its data transformation and data privacy mechanisms, and it is not yet fulfilling domain requirements. This paper aims to investigate recent privacy and security trends that are affecting the Internet of Drones (IoD). This study also highlights the need for a safe and secure drone network that is free from interceptions and intrusions. The proposed framework mitigates the cyber security threats by employing intelligent machine learning models in the design of IoT-aided drones by making them secure and adaptable. Finally, the proposed model is evaluated on a benchmark dataset and shows robust results. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.

2023 - Layton J. Mandle, Frederic S. Pearson - SAGE Publications

This study analyzes changes in top arms producers, new complexities in arms regulation due to advancing technologies and artificial intelligence, arms-control policies of international organizations and top arms producers, and the risks of poor regulation.

Cybersecurity and defense
2020 - ECPR

Israel has positioned itself in the world not only as a high-tech country, start-up nation, the country investing the most in research and development, or the most attractive place for investors but also as top armament exporter. According to Stockholm International Peace Research Institute in 2018 Israel takes 8th place in that regard and stands besides US, Russia, France, China, Germany, UK. This raises a question: how can a small nation succeed in such competitive field of
industry? The aim of this study is to investigate Israel defense industry (IDI) context and developments in IDI from 1930s to 2018, as that could possibly indicate a way forward for countries that prefer to develop or enhance national defense industry. R

Cybersecurity and defense
2019 - Christian Reuter, Larissa Aldehoff, Thea Riebe, Marc-André Kaufhold - Springer Fachmedien Wiesbaden

Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research.

Dual-use cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.