Academic literature on the topic 'Cyber(in-)security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber(in-)security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber(in-)security"

1

NASTASIU, Cătălin-Ionuț. "CYBER SECURITY STRATEGIES IN THE INTERNET ERA." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 18, no. 2 (June 24, 2016): 619–24. http://dx.doi.org/10.19062/2247-3173.2016.18.2.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kour, Jaspreet, M. Hanmandlu, and A. Q. Ansari. "Biometrics in Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 600. http://dx.doi.org/10.14429/dsj.66.10800.

Full text
Abstract:
Computers play an important role in our daily lives and its usage has grown manifolds today. With ever increasing demand of security regulations all over the world and large number of services provided using the internet in day to day life, the assurance of security associated with such services has become a crucial issue. Biometrics is a key to the future of data/cyber security. This paper presents a biometric recognition system which can be embedded in any system involving access control, e-commerce, online banking, computer login etc. to enhance the security. Fingerprint is an old and mature technology which has been used in this work as biometric trait. In this paper a fingerprint recognition system based on no minutiae features: Fuzzy features and Invariant moment features has been developed. Fingerprint images from FVC2002 are used for experimentation. The images are enhanced for improving the quality and a region of interest (ROI) is cropped around the core point. Two sets of features are extracted from ROI and support vector machine (SVM) is used for verification. An accuracy of 95 per cent is achieved with the invariant moment features using RBF kernel in SVM.
APA, Harvard, Vancouver, ISO, and other styles
4

Kondewar, Shweta Vivekananda. "Cyber Security in Healthcare." International Journal for Research in Applied Science and Engineering Technology 9, no. 3 (March 31, 2021): 145–48. http://dx.doi.org/10.22214/ijraset.2021.33159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaur, Prof Simranpreet. "Security in Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 694–98. http://dx.doi.org/10.22214/ijraset.2021.38023.

Full text
Abstract:
Abstract: The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Due to gradually increase of the internet users and netizens, abusage of technology is broadening gradually which tends to cyber-crimes. Cybercrime causes loss of billions of USD every year. Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security. Keywords: Cybercrime, Types, Protection, Cyber security, Hackers, Impact.
APA, Harvard, Vancouver, ISO, and other styles
6

CIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maqsood, Ayesha, and Muhammad Rizwan. "Security, Trust and Privacy In Cyber (Stpc Cyber)." International Journal of Scientific and Research Publications (IJSRP) 9, no. 2 (February 18, 2019): p8682. http://dx.doi.org/10.29322/ijsrp.9.02.2019.p8682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhargava, Rishi. "Cyber Crime And Cyber Security In Madhya Pradesh." National Journal of Environment and Scientific Research 2, no. 8 (August 22, 2021): 53. http://dx.doi.org/10.53571/njesr.2021.2.8.53-61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.

Full text
Abstract:
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.
APA, Harvard, Vancouver, ISO, and other styles
10

Priya, Mrs A. Lakshmi, and S. Letitia. "Dual Watermarking in Cyber Security." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (March 4, 2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.

Full text
Abstract:
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber(in-)security"

1

LOBATO, LUÍSA CRUZ. "UNRAVELING THE CYBER SECURITY MARKET: THE STRUGGLES AMONG CYBER SECURITY COMPANIES AND THE PRODUCTION OF CYBER (IN)SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27784@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
A presente dissertação investiga o papel das companhias de segurança cibernética na produção da segurança cibernética contemporânea. A crescente pressão para securitizar o ciberespaço contribuiu para o crescimento de um lucrativo mercado voltado para a provisão de produtos e serviços para clientes comerciais e governamentais. Utilizando uma perspectiva inspirada em Bourdieu, o trabalho: analisa as condições históricas nas quais as tecnologias da informação ganharam terreno no debate de segurança; identifica as posições e investiga as práticas das companhias de segurança cibernética no campo da segurança cibernética e analisa as disputas em andamento pela produção da segurança cibernética. Abordagens voltadas ao risco são pilares na concepção e comercialização de produtos e serviços anunciados pelas companhias. Neste sentido, argumenta-se que ambas as abordagens voltadas ao risco e as práticas comerciais das companhias de segurança cibernética produzem formas específicas de segurança. O trabalho identifica três distintas formas de segurança produzidas no campo: segurança defensiva, segurança ofensiva e defesa ativa. Analisa-se as implicações de cada forma para a segurança, de um modo geral, e argumenta-se que, enquanto grande parte das companhias adota uma estratégia de defesa ativa em seus produtos e serviços, algumas tem se orientado para a adoção de medidas mais ofensivas para lidar com os atuais riscos. A análise é concluída com algumas reflexões a respeito das implicações das atuais dinâmicas do mercado de segurança cibernética para a segurança e governança da Internet.
This dissertation examines the role of cyber security companies in the production of contemporary cyber security. The increasing pressures to securitize cyberspace have contributed to the growth of a lucrative market oriented at providing cyber security products and services to commercial and government customers. Using a Bourdieu-inspired framework, the work: analyzes the historical conditions under which information technologies gained ground within security debates; identifies the positions and investigates the practices of cyber security companies within the cyber security field and analyzes the ongoing struggles for the production of cyber security. Risk-based thinking is a cornerstone of the process of conceiving and commercializing products and services advertised by companies. In this sense, it is argued that both risk-based thinking and the commercial practices of cyber security companies produce specific forms of security. The work identifies three distinct forms of security produced within the field: defensive security, offensive security and active defense. It analyzes the implications of each form to the overall security of cyberspace and argues that whilst the majority of companies adopt an active defense approach in their products and services, some of them are leaning towards more offensive solutions to deal with current risks. It concludes the analysis with some thoughts on the implications of the current dynamics of the cyber security market for security and Internet governance.
APA, Harvard, Vancouver, ISO, and other styles
2

Sridharan, Venkatraman. "Cyber security in power systems." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.

Full text
Abstract:
Many automation and power control systems are integrated into the 'Smart Grid' concept for efficiently managing and delivering electric power. This integrated approach created several challenges that need to be taken into consideration such as cyber security issues, information sharing, and regulatory compliance. There are several issues that need to be addressed in the area of cyber security. Currently, there are no metrics for evaluating cyber security and methodologies to detect cyber attacks are in their infancy. There is a perceived lack of security built into the smart grid systems, but there is no mechanism for information sharing on cyber security incidents. In this thesis, we discuss the vulnerabilities in power system devices, and present ideas and a proposal towards multiple-threat system intrusion detection. We propose to test the multiple-threat methods for cyber security monitoring on a multi-laboratory test bed, and aid the development of a SCADA test bed, to be constructed on the Georgia Tech Campus.
APA, Harvard, Vancouver, ISO, and other styles
3

Patterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.

Full text
Abstract:
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions was to identify strategies that successful small business owners use to make cyber-security decisions. Data analysis consisted of coding keywords, phrases, and sentences from semi structured interviews as well as document analysis. The following themes emerged: government requirements, peer influence, budgetary constraints, commercial standards, and lack of employee involvement. According to the participants, budgetary constraints and peer influence were the most influential factors when making decisions regarding cyber-security strategies. Through exposing small business owners to proven strategies, the implications for social change include a reduction of their small business operating costs and assistance with compliance activities.
APA, Harvard, Vancouver, ISO, and other styles
4

Vuković, Ognjen. "Cyber-security in Smart Grid Communication and Control." Doctoral thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152223.

Full text
Abstract:
Society is increasingly dependent on the reliable operation of power systems. Power systems, at the same time, heavily rely on information technologies to achieve efficient and reliable operation. Recent initiatives to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation and demand response. Thus for the reliable operation of smart grids, it is essential that its information infrastructure is secure and reliable in the face of both failures and attacks. This thesis contributes to improving the security of power systems against attacks on their information infrastructures. The contributions lie in three areas: data integrity, data condentiality, and data availability of power system applications. We analyze how characteristics of power system applications can be leveraged for detection and mitigation of data integrity attacks. We consider singleand multi-area power system state estimation. For single-area state estimation, we look at the integrity of measurement data delivered over a wide area communication network. We deffine security metrics that quantify the importance of particular components of the communication network, and that allow us to optimize the deployment of network, transport and application layer security solutions. For multi-area state estimation, we look at the integrity of data exchanged between the control centers of neighboring areas in face of a targeted trojan that compromises an endpoint of the secure communication tunnel. We deffine multiple attack strategies and show that they can signifficantly disturb the state estimation. Moreover, we propose schemes that could be used for detection, localization, and mitigation of data integrity attacks. We investigate how to provide data confidentiality for power system applications when they utilize cloud computing. We focus on contingency analysis and propose an approach to obfuscate information regarding power flows and the presence of a contingency violation while allowing the operator to analyze contingencies with the needed accuracy in the cloud. Our empirical evaluation shows that the errors introduced into power flows due to the proposed obfuscation are small, and that the RMS errors introduced grow linearly with the magnitude of obfuscation. We study how to improve data availability in face of gray hole attacks combined with traffic analysis. We consider two cases: SCADA substation to control center communication using DNP3, and inter-control center communication. In the first case, we propose a support vector machine-based traffic analysis algorithm that uses only the information on timing and direction of three consecutive messages, and show that a gray hole attack can be effectively performed even if the traffic is sent through an encrypted tunnel. We discuss possible mitigation schemes, and show that a minor modication of message timing could help mitigate the attack. In the second case, we study how anonymity networks can be used to improve availability at the price of increased communication overhead and delay. We show that surprisingly availability is not always improved with more overhead and delay. Moreover, we show that it is better to overestimate than to underestimate the attacker's capabilities when conguring anonymity networks.

QC 20140924

APA, Harvard, Vancouver, ISO, and other styles
5

Dahlman, Elsa, and Karin Lagrelius. "A Game of Drones : Cyber Security in UAVs." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259295.

Full text
Abstract:
As Unmanned Aerial Vehicles (UAVs) are getting more popular and their area of use is expanding rapidly, the security aspect becomes important to investigate. This thesis is a systematic literature review that examines which type of cyber attacks are most common among attacks directed at civilian use UAVs and what consequences they bring. All cyber attacks presented in the report are categorized using the STRIDE threat model, which risk they pose and what equipment is required for the adversary to follow through with the attack. The findings are that Spoofing and Denial of Service attacks are the most common cyber attack types against UAVs and that hijacking and crashing are the most common results of the attacks. No equipment that is difficult to access is required for either of the attack types in most cases, making the result an indicator that the security state for civilian use UAVs today needs improving.
Obemannade luftburna farkoster (OLF) blir mer vanliga allteftersom deras användningsområde utökas, vilket innebär att cybersäkerhetsaspekten behöver studeras. Detta arbete är en systematisk litteraturstudie som undersöker vilka typer av cyberattacker riktade mot drönare som är vanligast och vilka risker de medför. Attackerna i rapporten är kategoriserade med hjälp av metoden STRIDE samt efter vilka mål attackerna haft och vilken utrustning som krävs. Resultatet är att Spoofing och Denial of Service-attacker är vanligast och att de medför att attackeraren kan kapa eller krascha drönaren. Ingen svåråtkomlig utrustning krävs för någon av dessa attacktyper vilket indikerar att säkerhetsläget för civila drönare behöver förbättras.
APA, Harvard, Vancouver, ISO, and other styles
6

Masonganye, James. "Analysis of cyber security in smart grid systems." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/66218.

Full text
Abstract:
Cyber security is a major concern due to global incidents of intrusion. The impact of the attacks on the electricity grid can be significant, resulting in the collapsing of the national economy. Electricity network is needed by banks, government security agencies, hospitals and telecommunication operators. The purpose of this research is to investigate the various types of cyber security threats, including ICT technologies required for safe operation of the smart grid to protect and mitigate the impact of cyber security. The modelling of cyber security using the Matlab/SimPowerSystem simulates the City of Tshwane power system. Eskom components used to produce energy, interconnect to the City of Tshwane power distribution substations and simulated using Simulink SimPowerSystem.
Dissertation (MEng)--University of Pretoria, 2017.
Electrical, Electronic and Computer Engineering
MEng
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
7

Sjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.

Full text
Abstract:
In a world where much of society is dependent on digital infrastructure, various cyber threats can pose a great risk to businesses, critical infrastructure and potentially entire nations. For this reason, research and education as well as the preparation of strategies,  training of personnel etc., is imperative. Cyber ranges can provide ''safe environments'' in which for example cyber security exercises and experiments can be conducted. While easier to deploy and configure than ''real'' infrastructures, monitoring of such environments during ongoing exercises/experiments poses a number of challenges. During this thesis work, the question of what types of data and information could be relevant to provide in a monitoring system for this context was investigated, with regard to aspects such as providing technical support or gaining situational awareness during exercises. Results gained from a survey with participants from relevant organizations, contributed greatly to this question. The survey and literature study also provided insights into challenges and potential problems of developing and running such monitoring. CRATE is a cyber range developed and maintained by the Swedish Defence Research Agency (FOI). In this thesis work, some of the challenges and potential problems found are tackled with a suggested design and an implemented monitoring system prototype for CRATE. Apart from providing functionality to retrieve information about accounts and privileges as well as status of services, the design of the prototype also lays the foundation for a flexible and extensible monitoring system -- fully adapted for use within a cyber range. With cyber exercises becoming both more prevalent and extensive, the need for capable monitoring of exercise environments will naturally arise. While the developed prototype may facilitate future cyber exercises/experiments in CRATE, the results of this thesis work are also ready to be used as a source of inspiration for other cyber range operators.
APA, Harvard, Vancouver, ISO, and other styles
8

Locke, Ronald Taylor. "Anomaly detection with applications in environmental and cyber security." Thesis, Boston University, 2012. https://hdl.handle.net/2144/33260.

Full text
Abstract:
Thesis (Ph.D.)--Boston University
PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Two approaches to detecting anomalous behavior within a sequence of random observations are presented. One approach is stochastic in nature, using large deviations techniques to form a Hoeffding decision test. Scenarios in which sequential observations can be considered independent and identically distributed (iid) or adhere to a first-order Markov chain are both considered. The Markovian case is explored further and asymptotic performance results are developed for using the generalized likelihood ratio test (GLRT) to identify a Markov source. After a presentation of binary and multi-class Support Vector Machines (SVM), a deterministic anomaly detection method based on the so-called one-class SVM is also presented. The presented methodologies are then applied to detection and localization of Chemical, Biological, Radiological, or Nuclear (CBRN) events in an urban area using a network of sensors. In contrast to earlier work, these approaches do not solve an inverse dispersion problem but rely on data obtained from a simulation of the CBRN dispersion to obtain descriptors of sensor measurements under a variety of CBRN release scenarios. To assess the problem of environmental monitoring, CBRN event-free conditions are assumed to be iid and a corresponding stochastic anomaly detector is relied on to detect a CBRN event. Conditional on such an event, subsequent sensor observations are assumed to follow a Markov process. Accordingly, the presented Markov source identification methodology is used to map sensor observations to a source location chosen out of a discrete set of possible locations. A multi-class SVM approach to CBRN localization is also developed, and the two techniques are compared using three-dimensional CBRN release simulations. Also addressed is the problem of optimally placing sensors to minimize the localization probability of error. The anomaly detection approaches are then applied to detection of data exfiltration-style attempts on a network server. Two one-class SVM approaches are presented. In both, data packet transmissions are captured and compiled into network flows. In a flow-by-flow network anomaly detector, features are extracted from individual flows and their novelty is tested. If a flows features differ too greatly from nominal flow features, as determined by the SVM, that flow is declared an anomaly. In a network-wide anomaly detector, the novelty of a time sequence of flows is tested. The stochastic anomaly detectors are applied to sequences of flows as well, under the contexts of subsequent network flows either being iid or following a Markov process. These techniques are evaluated on simulated network traffic.
2031-01-01
APA, Harvard, Vancouver, ISO, and other styles
9

Chivukula, Venkata Ramakrishna. "Detecting Cyber Security Anti-Patterns in System Architecture Models." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-293027.

Full text
Abstract:
Organizations across the world have been on the receiving end of large-scale cyber-attacks. Over time, the number and the success of these attacks have grown to a high level. To prepare for these attacks, organizations have to test the resilience of their infrastructures. One way to manage the risk of these attacks and to ensure security is the use of threat modeling. Through threat modeling, organizations can analyze their infrastructure and identify vulnerabilities. The vulnerabilities then have to be patched to improve the overall security posture of the organization. When modeled, these vulnerabilities can occur in different forms. Certain vulnerabilities are specific to certain components in the system. On the other hand, some deficiencies occur in conjunction with multiple assets in the infrastructure. These are called structural deficiencies. Identifying and mitigating these structural deficiencies is very important. In this thesis, structural deficiencies are described and a catalog of some deficiencies is built through a survey. The deficiencies and the catalog are developed towork with Foreseeti AB’s securiCADmodeling software. Further, a deficiency model is defined that can enable description and search of these deficiencies in securiCAD models. Using the description model, all occurrences of the deficiency can be found. These occurrences then can be replaced with structural improvements. The improved securiCAD models are then tested with simulations. The results from the simulations show that the structural improvements are useful in significantly reducing the Time-To-Compromise (TTC) of important assets. Using the catalog and the deficiency model, system administrators can identify deficiencies and test the effect of different improvements in the securiCAD model which can then be applied to the actual infrastructure.
Organisationer över hela världen har blivit måltavlor för storskaliga cyberattacker. Över tid har antalet framgångsrika attacker vuxit till en hög nivå. Som en förberedelse för dessa attacker måste organisationer testa sin infrastrukturs motståndskraft. Ett sätt att hantera risken för dessa attacker och säkerställa säkerhet är användningen av hotmodellering och attacksimuleringar. Genom hotmodellering och attacksimuleringar kan organisationer analysera egenskaperna för informationssäkerhet i sin infrastruktur och identifiera svaga punkter. Svagheterna måste sedan hanteras för att förbättra organisationens övergripande säkerhetsposition. När de modelleras kan dessa svagheter förekomma i olika former. Vissa är komponentspecifika och lokala till ett objekt i infrastrukturen. Dessa kan hanteras med hjälp av försvar som definieras i securi- CAD. Andra svagheter kan uppstå genom relationerna mellan flera objekt i infrastrukturen. Dessa kallas strukturella svagheter. Att identifiera och mildra dessa strukturella svagheter är mycket viktigt. I denna avhandling beskrivs strukturella svagheter och en katalog med svagheter har byggts upp. Vidare definieras en modell som möjliggör beskrivning av dessa svagheter och möjliggör identifiering av svagheter i securiCADmodeller. Med hjälp av beskrivningsmodellen kan alla förekomster av bristen hittas. Dessa händelser kan sedan ersättas med strukturella förbättringar. De förbättrade securiCAD-modellerna analyseras sedan. Resultaten visar att de strukturella förbättringarna är användbara för att avsevärt minska Time-To- Compromise (TTC) för viktiga tillgångar. Med hjälp av katalogen och modellen kan systemadministratörer identifiera svagheter och testa effekten av olika förbättringar i securiCAD-modellen som sedan kan tillämpas på den faktiska infrastrukturen.
APA, Harvard, Vancouver, ISO, and other styles
10

Fischer, Fabian [Verfasser]. "Visual Analytics for Situational Awareness in Cyber Security / Fabian Fischer." Konstanz : Bibliothek der Universität Konstanz, 2016. http://d-nb.info/1122561830/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyber(in-)security"

1

Shukla, Sandeep Kumar, and Manindra Agrawal, eds. Cyber Security in India. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1675-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Bazhong, Baocang Wang, Jinguang Han, and Yong Yu, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0818-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Guangquan, Kaitai Liang, and Chunhua Su, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9739-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anbar, Mohammed, Nibras Abdullah, and Selvakumar Manickam, eds. Advances in Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2693-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Fagen, Tsuyoshi Takagi, Chunxiang Xu, and Xiaosong Zhang, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3095-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anbar, Mohammed, Nibras Abdullah, and Selvakumar Manickam, eds. Advances in Cyber Security. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6835-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rass, Stefan, Stefan Schauer, Sandra König, and Quanyan Zhu. Cyber-Security in Critical Infrastructures. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46908-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Probst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Insider threats in cyber security. New York: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Awad, Ali Ismail, Steven Furnell, Marcin Paprzycki, and Sudhir Kumar Sharma, eds. Security in Cyber-Physical Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67361-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber(in-)security"

1

Austin, Greg. "Education in Cyber Security." In Cybersecurity in China, 21–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68436-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fielder, James D. "Cyber security in Kenya." In Routledge Companion to Global Cyber-Security Strategy, 543–52. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahrend, Jan M., and Marina Jirotka. "Anticipation in Cyber-Security." In Handbook of Anticipation, 1–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-31737-3_26-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahrend, Jan M., and Marina Jirotka. "Anticipation in Cyber-security." In Handbook of Anticipation, 1559–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91554-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Madhusudan. "In-Vehicle Cyber Security." In Information Security of Intelligent Vehicles Communication, 117–24. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2217-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Shiho, and Rakesh Shrestha. "In-Vehicle Communication and Cyber Security." In Automotive Cyber Security, 67–96. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8053-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mishra, Shiv Dutta, Bhupesh Kumar Dewangan, and Tanupriya Choudhury. "Cyber Security in Cloud Platforms." In Information Security and Optimization, 159–70. First edition. | Boca Raton : C&H\CRC Press, 2021.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cassenti, Daniel N., Vladislav D. Veksler, and Blaine Hoffman. "Adaptive Automation in Cyber Security." In Advances in Intelligent Systems and Computing, 280–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94223-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hurel, Louise Marie, and Luisa Cruz Lobato. "Cyber security governance in Brazil." In Routledge Companion to Global Cyber-Security Strategy, 504–18. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ravidas, Dhrisya, Malcolm R. Pattinson, and Paula Oliver. "Cyber Security in Healthcare Organisations." In Human Aspects of Information Security and Assurance, 3–11. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber(in-)security"

1

"Cyber Security Capacity Building: Cyber Security Education in Finnish Universities." In The 19th European Conference on Cyber Warfare. ACPI, 2020. http://dx.doi.org/10.34190/ews.20.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Cyber Security in HSI." In 2019 12th International Conference on Human System Interaction (HSI). IEEE, 2019. http://dx.doi.org/10.1109/hsi47298.2019.8942627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tioh, Jin-Ning, Mani Mina, and Douglas W. Jacobson. "Cyber security training a survey of serious games in cyber security." In 2017 IEEE Frontiers in Education Conference (FIE). IEEE, 2017. http://dx.doi.org/10.1109/fie.2017.8190712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Agbaje, Micheal, Oludele Awodele, and Chibueze Ogbonna. "Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2138.

Full text
Abstract:
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber security research due to losses from sabotage being experienced by nations, businesses and individuals from various cybercrime attacks. This paper takes a look at the applications digital watermarking to the process of protection in cyber space called cyber watermarking particularly focusing on theft of information (identity & credit card theft).The methodology of the research is through literature search and case study. The rest of the paper presents a brief overview of the digital watermarking and issues in cyber security.
APA, Harvard, Vancouver, ISO, and other styles
5

Dogaru, Delia Ioana, and Ioan Dumitrache. "Cyber security in healthcare networks." In 2017 E-Health and Bioengineering Conference (EHB). IEEE, 2017. http://dx.doi.org/10.1109/ehb.2017.7995449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Safdar, Ghazanfar A., Tahera Kalsoom, and Naeem Ramzan. "Security Challenges in Cyber Systems." In 2020 International Conference on UK-China Emerging Technologies (UCET). IEEE, 2020. http://dx.doi.org/10.1109/ucet51115.2020.9205388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dsouza, Joanita, Laura Elezabeth, Ved Prakash Mishra, and Rachna Jain. "Security in Cyber-Physical Systems." In 2019 Amity International Conference on Artificial Intelligence (AICAI). IEEE, 2019. http://dx.doi.org/10.1109/aicai.2019.8701411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Howard, Newton, and Sergey Kanareykin. "Intention awareness in cyber security." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Parmar, Manjula R., M. Uttara Kumari, and Ramesh S. N. "CYBER SECURITY IN VEHICLE COMMUNICATION." In 2020 IEEE International Conference for Innovation in Technology (INOCON). IEEE, 2020. http://dx.doi.org/10.1109/inocon50539.2020.9298286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dasgupta, Dipankar. "Computational Intelligence in Cyber Security." In 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety. IEEE, 2006. http://dx.doi.org/10.1109/cihsps.2006.313289.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber(in-)security"

1

Meza, Juan, Scott Campbell, and David Bailey. Mathematical and Statistical Opportunities in Cyber Security. Office of Scientific and Technical Information (OSTI), March 2009. http://dx.doi.org/10.2172/950976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

ASIAN TECHNOLOGY INFORMATION PROGRAM. ATIP Report: Cyber Security Research in China. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ada619229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harris, Emilee. Success in Industrial Control System Cyber Security Training. Office of Scientific and Technical Information (OSTI), January 2016. http://dx.doi.org/10.2172/1483594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meyers, C., S. Powers, and D. Faissol. Probabilistic Characterization of Adversary Behavior in Cyber Security. Office of Scientific and Technical Information (OSTI), October 2009. http://dx.doi.org/10.2172/967711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bichler, Stephen F. Mitigating Cyber Security Risk in Satellite Ground Systems. Fort Belvoir, VA: Defense Technical Information Center, April 2015. http://dx.doi.org/10.21236/ad1012754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

DEFENSE SCIENCE BOARD WASHINGTON DC. Cyber Security and Reliability in a Digital Cloud. Fort Belvoir, VA: Defense Technical Information Center, January 2013. http://dx.doi.org/10.21236/ada581218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Older, Susan. Advanced Course in Engineering (ACE) - Cyber Security Boot Camp. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada481166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shalamanov, Velizar, and Irena Mladenova. UK-BG Partnership in Cyber Security for SME and Organizations. Procon, 2021. http://dx.doi.org/10.11610/cybsec04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Akyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), September 2012. http://dx.doi.org/10.2172/1052949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smidts, Carol, Indrajit Ray, Quanyan Zhu, Timothy Mabry, and Timothy McJunkin. Support for Reactor Operators in Case of Cyber-Security Threats. Final Report. Office of Scientific and Technical Information (OSTI), December 2019. http://dx.doi.org/10.2172/1581617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography