To see the other types of publications on this topic, follow the link: Cyber(in-)security.

Journal articles on the topic 'Cyber(in-)security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber(in-)security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

NASTASIU, Cătălin-Ionuț. "CYBER SECURITY STRATEGIES IN THE INTERNET ERA." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 18, no. 2 (June 24, 2016): 619–24. http://dx.doi.org/10.19062/2247-3173.2016.18.2.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kour, Jaspreet, M. Hanmandlu, and A. Q. Ansari. "Biometrics in Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 600. http://dx.doi.org/10.14429/dsj.66.10800.

Full text
Abstract:
Computers play an important role in our daily lives and its usage has grown manifolds today. With ever increasing demand of security regulations all over the world and large number of services provided using the internet in day to day life, the assurance of security associated with such services has become a crucial issue. Biometrics is a key to the future of data/cyber security. This paper presents a biometric recognition system which can be embedded in any system involving access control, e-commerce, online banking, computer login etc. to enhance the security. Fingerprint is an old and mature technology which has been used in this work as biometric trait. In this paper a fingerprint recognition system based on no minutiae features: Fuzzy features and Invariant moment features has been developed. Fingerprint images from FVC2002 are used for experimentation. The images are enhanced for improving the quality and a region of interest (ROI) is cropped around the core point. Two sets of features are extracted from ROI and support vector machine (SVM) is used for verification. An accuracy of 95 per cent is achieved with the invariant moment features using RBF kernel in SVM.
APA, Harvard, Vancouver, ISO, and other styles
4

Kondewar, Shweta Vivekananda. "Cyber Security in Healthcare." International Journal for Research in Applied Science and Engineering Technology 9, no. 3 (March 31, 2021): 145–48. http://dx.doi.org/10.22214/ijraset.2021.33159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaur, Prof Simranpreet. "Security in Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 694–98. http://dx.doi.org/10.22214/ijraset.2021.38023.

Full text
Abstract:
Abstract: The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Due to gradually increase of the internet users and netizens, abusage of technology is broadening gradually which tends to cyber-crimes. Cybercrime causes loss of billions of USD every year. Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security. Keywords: Cybercrime, Types, Protection, Cyber security, Hackers, Impact.
APA, Harvard, Vancouver, ISO, and other styles
6

CIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maqsood, Ayesha, and Muhammad Rizwan. "Security, Trust and Privacy In Cyber (Stpc Cyber)." International Journal of Scientific and Research Publications (IJSRP) 9, no. 2 (February 18, 2019): p8682. http://dx.doi.org/10.29322/ijsrp.9.02.2019.p8682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhargava, Rishi. "Cyber Crime And Cyber Security In Madhya Pradesh." National Journal of Environment and Scientific Research 2, no. 8 (August 22, 2021): 53. http://dx.doi.org/10.53571/njesr.2021.2.8.53-61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.

Full text
Abstract:
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.
APA, Harvard, Vancouver, ISO, and other styles
10

Priya, Mrs A. Lakshmi, and S. Letitia. "Dual Watermarking in Cyber Security." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (March 4, 2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.

Full text
Abstract:
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
APA, Harvard, Vancouver, ISO, and other styles
11

Kalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (August 1, 2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.

Full text
Abstract:
Abstract Cyber Security accepts a vigorous role in the area of information technology. Safeguarding the information has become an enormous problem in the current day. The cybersecurity the main thing that originates in mind is ‘cyber crimes’ which are aggregate colossally daily. Different governments and organizations are taking numerous measures to keep these cyber wrongdoings. Other than different measures cybersecurity is as yet a significant worry to many. This paper mostly emphases on cyber security and cyber terrorism. The significant trends of cybersecurity and the consequence of cybersecurity discuss in it. The cyber-terrorism could make associations lose billions of dollars in the region of organizations. The paper also explains the components of cyber terrorism and motivation of it. Two case studies related to cybersecurity also provide in this paper. Some solution about cyber security and cyber terrorism also explain in it.
APA, Harvard, Vancouver, ISO, and other styles
12

RICCI, Sara, Jan HAJNY, Edmundas PIESARSKAS, Simon PARKER, and Vladimir JANOUT. "Challenges in Cyber Security Education." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 7–11. http://dx.doi.org/10.19107/ijisc.2020.02.01.

Full text
Abstract:
Cyber security education is an important and pertinent topic as it plays a major role in mitigating the risks caused by a global shortage of cyber security experts. In order to better support this crucial function, a cyber security skills framework needs to be agreed upon by academics in this field, along with an increase in the visibility of cyber security education and training. Without these, there is likely to be a long-term shortfall between the number of skilled cyber security professionals and demand, potentially leaving organisations, institutions, and governments vulnerable. Our contribution to this challenge is threefold. Firstly this article addresses the development of a cyber security skills framework and its applicability. Secondly, we have analysed a sample of 87 study programs in order to produce an overview of cyber security topic areas. Moreover, the collected data are visualized in an interactive map, i.e. a dynamic web application with the aim to help students in their search for a cyber security study program. Finally, a cyber security curricula designer tool is proposed; this application would serve as a guideline for cyber security curricula designers.
APA, Harvard, Vancouver, ISO, and other styles
13

Liaropoulos, Andrew N. "Reconceptualising Cyber Security." International Journal of Cyber Warfare and Terrorism 6, no. 2 (April 2016): 32–40. http://dx.doi.org/10.4018/ijcwt.2016040103.

Full text
Abstract:
The cyber security discourse is dominated by states and corporations that focus on the protection of critical information infrastructure and databases. The priority is the security of information systems and networks, rather than the protection of connected users. The dominance of war metaphors in the cyber security debates has produced a security dilemma, which is not sufficiently addressing the needs of people. This article underlines this shortcoming and views cyber security through a human-centric perspective. Freedom of expression and the right to privacy are under attack in the era of cyber surveillance. From a human-centric perspective such rights should be understood as a critical part of cyber security. Human rights protections need to be effectively addressed in the digital sphere and gain their place in the cyber security agendas.
APA, Harvard, Vancouver, ISO, and other styles
14

Penchev, Georgi. "Planning and Implementing Change in Cyber Security Network Organisations." Information & Security: An International Journal 50 (2021): 89–101. http://dx.doi.org/10.11610/isij.5008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Dol, Ganraj Rajendra. "A Research on Cyber Security And Cyber Coercion." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 2110–12. http://dx.doi.org/10.22214/ijraset.2021.35455.

Full text
Abstract:
Cyber Security accepts an active role within the space of data technology. Safeguarding the knowledge has become a vast downside within the current day. The cyber security the most issue that originates in mind is 'cyber crimes' that are combination colossally daily. completely different governments and organizations are taking various measures to stay these cyber wrongdoings. aside from completely different measures cyber security is until now a major worry to several. This paper principally emphases on cyber security and cyber coercion. the numerous trends of cyber security and also the consequence of cyber security discuss in it. The act of terrorism might build associations lose billions of bucks within the region of organizations. The paper conjointly explains the parts of cyber coercion and motivation of it. 2 case studies associated with cyber security conjointly offer during this paper. Some answer concerning cyber security and cyber coercion conjointly justify in it.
APA, Harvard, Vancouver, ISO, and other styles
16

Sharma, Rajasekhar. "Artificial Intelligence in Cyber Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 8 (August 31, 2020): 1121–23. http://dx.doi.org/10.22214/ijraset.2020.31123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mishra, Praveen Kumar, and Prabhakar Tiwari. "Cyber Security in Smart Grid." International Research Journal on Advanced Science Hub 2, no. 6 (September 19, 2020): 26–30. http://dx.doi.org/10.47392/irjash.2020.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Strand, Chris. "Challenging confidence in cyber-security." Computer Fraud & Security 2014, no. 12 (December 2014): 12–15. http://dx.doi.org/10.1016/s1361-3723(14)70556-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Harašta, Jakub. "Cyber Security in Young Democracies." Jurisprudence 20, no. 4 (2013): 1457–72. http://dx.doi.org/10.13165/jur-13-20-4-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sadiku, Matthew N. O., Omobayode I. Fagbohungbe, and Sarhan M. Musa. "Artificial Intelligence in Cyber Security." International Journal of Engineering Research and Advanced Technology 06, no. 05 (2020): 01–07. http://dx.doi.org/10.31695/ijerat.2020.3612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Baldwin, Adrian, Iffat Gheyas, Christos Ioannidis, David Pym, and Julian Williams. "Contagion in cyber security attacks." Journal of the Operational Research Society 68, no. 7 (July 2017): 780–91. http://dx.doi.org/10.1057/jors.2016.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kulshreshtha, Neelabh. "HCI: Use in Cyber Security." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 10, 2021): 109–13. http://dx.doi.org/10.22214/ijraset.2021.36246.

Full text
Abstract:
This paper deals with the uses of HCI (Human-Computer Interaction) with Cyber Security and Information Security. Even though there have been efforts to strengthen the infrastructure of the security systems, there are many endemic problems which still exist and are a major source of vulnerabilities. The paper also aims to bridge the gap between the end-user and the technology of HCI. There have been many widespread security problems from the perspective of the security community, many of which arise due to the bad interaction between humans and systems. Developing on the Human-Computer Interaction is an important part of the security system architecture because even the most secure systems exist to serve human users and carry out human-oriented processes, and are designed and built by humans. HCI is concerned with the user interfaces and how they can be improved because most users' perceptions are based on their experience with these interfaces. There has been immense research on this field and many advances have been made in this arena of HCI. Speaking of Information Security on the other hand has been a major concern for the present world scenario where everything is done in the digital world.
APA, Harvard, Vancouver, ISO, and other styles
23

BEST, Michael, Lachezar KRUMOV, and Ioan BACIVAROV. "Cyber Security in Banking Sector." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 39–52. http://dx.doi.org/10.19107/ijisc.2019.02.04.

Full text
Abstract:
Because banks are very often target of a cyber-attack, they have also good security controls in place. This paper analysis modern threats to banks and proposes an approach to detect and visualize the risk of data leakage. In the first part of this paper, a comparative analysis of the most common threats to the banking sector is made, based on both bank reports and cyber security companies. The authors came to the conclusion that at the bottom line, insider knowledge is necessary, which is the result of data leakage. This paper comparatively analysis modern threats to banks and shows an approach to detect and visualize the risk of data leakage. In the second part of the paper, a model - based on network graph - that can enumerate the risk of data leakage is proposed. Graphing a network of an organization with the connections of data flow between assets and actors can identify insecure connections that may lead to data leakage. As is demonstrated in this paper, financial institutions are important targets of cyber attacks. Consequently, the financial sector must invest heavily in cybersecurity and find the best ways to counter cyber attacks and cyber bank robbery attempts.
APA, Harvard, Vancouver, ISO, and other styles
24

Das, Rammanohar, and Raghav Sandhane. "Artificial Intelligence in Cyber Security." Journal of Physics: Conference Series 1964, no. 4 (July 1, 2021): 042072. http://dx.doi.org/10.1088/1742-6596/1964/4/042072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Shevchenko, Svitlana, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, and Kateryna Kravchuk. "MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY." Cybersecurity: Education, Science, Technique, no. 5 (2019): 31–39. http://dx.doi.org/10.28925/2663-4023.2019.5.3139.

Full text
Abstract:
The article deals with the application of modern mathematical apparatus in information and cyber security namely fractal analysis. The choice of fractal modeling for the protection of information in the process of its digital processing is grounded. Based on scientific sources, the basic definitions of the research are analyzed: fractal, its dimension and basic properties used in the process of information protection. The basic types of fractals (geometric, algebraic, statistical) are presented and the most famous of them are described. The historical perspective of the development of fractal theory is conducted. Different approaches to the application of fractal theory in information and cyber security have been reviewed. Among them are: the use of fractal analysis in encryption algorithms; development of a method of protecting documents with latent elements based on fractals; modeling the security system of each automated workplace network using a set of properties that can be represented as fractals. The considered approaches to the application of fractal analysis in information and cyber security can be used in the preparation of specialists in the process of research work or diploma work.
APA, Harvard, Vancouver, ISO, and other styles
26

Cempaka Timur, Fauzia Gustarina. "The Rise of Cyber Diplomacy ASEAN’s Perspective in Cyber Security." KnE Social Sciences 2, no. 4 (June 13, 2017): 244. http://dx.doi.org/10.18502/kss.v2i4.893.

Full text
Abstract:
Recent decades have seenhow information technology have shaed global politics tothe extent that defense and security experts claim it to be the beginning of a new era in warfare. Many foreign countries have begun to include cyber threat as a defining factor in international security space, which also concludes the importance of cyber security in foreign policy. In the regional framework, ASEAN has promoted small but meaningful step to ensure cyber security. The paper focuses on the concept of cyber diplomacy in ASEAN and the development of cyber security in Southeast Asia to cope with the present security challenges.
APA, Harvard, Vancouver, ISO, and other styles
27

Bakhanova, M., and L. Synyayeva. "CYBER SHIP AND CYBER SECURITY IN THE BANKING SPHERE." Scientific papers OF DMYTRO MOTORNYI TAVRIA STATE AGROTECHNOLOGICAL UNIVERSITY (ECONOMIC SCIENCES) 41 (2020): 5–12. http://dx.doi.org/10.31388/2519-884x-2020-41-5-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (January 2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.

Full text
Abstract:
This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their representatives, and data subjects. This study relied on data gathered through key informant interviews and documentary search. The key informants were drawn from various institutions that deal with cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
29

STEZHKO, S., and T. SHEVCHENKO. "Current US experience in cyber security." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 139–44. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238349.

Full text
Abstract:
The content and key aspects of the US Cyber Security Strategy are considered. The principles of the state cyber security policy of the USA are defined. Typical threats to the United States in cyberspace are outlined. The state priorities for strengthening the components of cyber defense in the United States are summarized. The issue of financing cyber security in the United States in 2021 is detailed. The principles of joint activities of American-Ukrainian relations in the field of cyber security are specified. The list of measures implemented in the United States to strengthen the state's capabilities in the field of cyber security has been identified.
APA, Harvard, Vancouver, ISO, and other styles
30

Kovács, László. "National Cyber Security as the Cornerstone of National Security." Land Forces Academy Review 23, no. 2 (June 1, 2018): 113–20. http://dx.doi.org/10.2478/raft-2018-0013.

Full text
Abstract:
Abstract The more advanced digital economy and society a country has the more exposed it is to cyber threats. Consequently, countries with advanced digital economy and digital infrastructure naturally need to pay more attention to protecting cyber space. Today it is a national security issue and it can no longer be argued that cyber security is its indispensable part. Accordingly, a national cyber security strategy has to be built on national security strategy. That is the main reason for using the word “cornerstone” in the title of this study. The relation between national security and national cyber security means a specific context, which is one of the subjects of our examination in this study. Today, most countries have a cyber security strategy. However, these strategies are mostly static documents that do not or only partially can handle the dynamism that characterizes cyberspace. This paper focuses on the key issues that are needed for developing a usable cyber security strategy.
APA, Harvard, Vancouver, ISO, and other styles
31

Rekha, Gillala, Shaveta Malik, Amit Kumar Tyagi, and Meghna Manoj Nair. "Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security." Advances in Science, Technology and Engineering Systems Journal 5, no. 3 (2020): 72–81. http://dx.doi.org/10.25046/aj050310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Murugesan, M., P. Balamurugan, J. Santhosh, and G. Arulkumaran. "Threats and Emerging Developments in Cyber Security." Webology 17, no. 2 (December 21, 2020): 587–98. http://dx.doi.org/10.14704/web/v17i2/web17053.

Full text
Abstract:
Cyber security plays a significant role in science. Data or information security is one of the crucial issues facing the world, when there is discussion about the rapidly growing cyber-crimes, the government and many corporations are taking many steps to stop such crimes. Driven by several different measures, cybercrime continues to expand day by day. In this review, the problems confronting cyber security from emerging technological advances and developments are briefly discussed and, in turn, the paper also reflects on the newest cyber security technologies, trends and other ethics throughout the cyber security field.
APA, Harvard, Vancouver, ISO, and other styles
33

Goswami, Arvind. "Impact of Cyber Security in Different Application of E-Governance." Journal of Advances and Scholarly Researches in Allied Education 15, no. 4 (June 1, 2018): 65–70. http://dx.doi.org/10.29070/15/57309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kurebwa, Jeffrey, and Eunice Magumise. "The Effectiveness of Cyber Security Frameworks in Combating Terrorism in Zimbabwe." International Journal of Cyber Research and Education 2, no. 1 (January 2020): 1–16. http://dx.doi.org/10.4018/ijcre.2020010101.

Full text
Abstract:
This study investigated the effectiveness of Zimbabwe's cyber security frameworks in combating terrorism. Media reports and scholarly evidence have constantly shown that cybercrime has led to loss of life, money, security, damage to property. There is a lot of concern among citizens of African countries such as Zimbabwe, Kenya, and Nigeria that their governments are not equipped with effective cyber security systems to combat these cyber threats. It is on the basis of these concerns that this study was carried out with the hope of helping to close policy and knowledge gaps affecting the effectiveness of the cyber security frameworks of Zimbabwe. The study used qualitative methodology and a case study research design was utilised. The study was conducted in Harare the capital city of Zimbabwe. Key informant interviews and documentary search were used to collect data. Among the findings of the study were that cyber fraud and theft are some of the significant cyber security threats in Zimbabwe; that Zimbabwe lacks established legislation and other regulatory institutions for cyber-security. Among the recommendations are; that the Ministry of Justice, Legal and Parliamentary Affairs enacts cyber security laws in Zimbabwe to combat cyber terrorism.
APA, Harvard, Vancouver, ISO, and other styles
35

Pandey, Shipra, Rajesh Kumar Singh, Angappa Gunasekaran, and Anjali Kaushik. "Cyber security risks in globalized supply chains: conceptual framework." Journal of Global Operations and Strategic Sourcing 13, no. 1 (January 13, 2020): 103–28. http://dx.doi.org/10.1108/jgoss-05-2019-0042.

Full text
Abstract:
Purpose The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS. Design/methodology/approach Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view. Findings This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies. Research limitations/implications The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study. Practical implications This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs. Originality/value The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.
APA, Harvard, Vancouver, ISO, and other styles
36

Aggarwal, Palvi, Frederic Moisan, Cleotilde Gonzalez, and Varun Dutt. "Understanding Cyber Situational Awareness in a Cyber Security Game involving." International Journal on Cyber Situational Awareness 4, no. 1 (December 7, 2018): 11–38. http://dx.doi.org/10.22619/ijcsa.2018.100118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (November 1, 2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.

Full text
Abstract:
Cyber security has become an important issue both on the EU and the national level. Cyber security is now perceived as a part of national security. The newly emerging cyber security policy, comprising national cyber security strategies as an important constituent part, has been recently paid considerable attention. Speaking of national cyber security strategies, a positive thing is that the majority of EU member states have already approved such strategies. However, the approved strategies differ considerably in terms of their content and implementation. The present article aims at identifying reasons for differences in individual national strategies and analyses aspects of their unifications in expectation to find out an optimum balance between the degree of unification and the need to retain differences arising from intrinsic national singularities. To this end, the article analyses the issue of national cyber security on the basis of Lithuania's cyber security strategy as a sample in the context of ENISA good practices for the development of cyber security strategies and by application of ENISA developed KPIs and testing ENISA cyber security strategy evaluation tool. Finally, the article suggests recommendations on further development of national cyber security strategies in terms of their unification and national singularities.
APA, Harvard, Vancouver, ISO, and other styles
38

Trim, Peter R. J., and Yang-Im Lee. "The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement." Big Data and Cognitive Computing 5, no. 3 (July 13, 2021): 32. http://dx.doi.org/10.3390/bdcc5030032.

Full text
Abstract:
In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in real time. We deployed a qualitative research strategy that involved a group interview involving cyber security and intelligence experts. The coding approach was used to identify the themes in the data and, in addition, a number of categories and subcategories were identified. The mind map approach was utilized to identify the thought processes of senior managers in relation to ensuring that the cyber security management process is effective. The global cyber security model can be used by senior managers to establish a framework for dealing with a range of cyber security attacks, as well as to upgrade the cyber security skill and knowledge base of individuals. In order for a cyber security mentality to be established, senior managers need to ensure that staff are focused on organizational vulnerability and resilience, there is an open and transparent communication process in place, and staff are committed to sharing cyber security knowledge. By placing cyber security within the context of a partnership arrangement, senior managers can adopt a collectivist approach to cyber security and benefit from the knowledge of external experts.
APA, Harvard, Vancouver, ISO, and other styles
39

Peev, Momtchil, and Fred Fung. "1.2 Cyber Security - Blogbeitrag: Security in the Quantum Age." Digitale Welt 5, no. 4 (September 20, 2021): 68–71. http://dx.doi.org/10.1007/s42354-021-0413-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Karagozlu, Damla. "Determination of cyber security ensuring behaviours of pre-service teachers." Cypriot Journal of Educational Sciences 15, no. 6 (December 31, 2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.

Full text
Abstract:
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study is to determine the behaviours of pre-service teachers as this study’s objective is to determine the behaviours of pre-service teachers regarding cyber security. This study is designed according to the quantitative research method and the Personal Cyber Security Ensuring Scale has been used. 144 pre-service teachers of two different universities who took up instructional technologies and material design courses in the 2019–2020 spring semester participated in the study. It has been observed that the participants frequently took measures when they noticed unreliable people and situations in the internet environment but took occasional measures in terms of not leaving any trace, taking precautions and protecting personal privacy. Keywords: Cyber attack, cyber security, personal cyber security, pre-service teachers
APA, Harvard, Vancouver, ISO, and other styles
41

Ismail, Asim, Muhammad Saad, and Robert Abbas. "Cyber security in internet of things." Review of Computer Engineering Studies 5, no. 1 (March 30, 2019): 17–22. http://dx.doi.org/10.18280/rces.050104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Marmita, Sharmaine. "Struggle of ASEAN in cyber security." Asia and Africa today, no. 8 (2020): 52. http://dx.doi.org/10.31857/s032150750010451-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bajpai, Ashish, Dayanand ., and Arushi Arya. "Big Data Analytics in Cyber Security." International Journal of Computer Sciences and Engineering 6, no. 7 (July 31, 2018): 731–34. http://dx.doi.org/10.26438/ijcse/v6i7.731734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Roşu, Livia, and Georgiana Subaşu. "Digital Forensics in Cyber Security Exercises." Journal of Military Technology 1, no. 1 (June 18, 2018): 13–18. http://dx.doi.org/10.32754/jmt.2018.1.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Renaud, Karen, and Verena Zimmermann. "How to nudge in cyber security." Network Security 2020, no. 11 (November 2020): 20. http://dx.doi.org/10.1016/s1353-4858(20)30132-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Moreira, Naiara, Elías Molina, Jesús Lázaro, Eduardo Jacob, and Armando Astarloa. "Cyber-security in substation automation systems." Renewable and Sustainable Energy Reviews 54 (February 2016): 1552–62. http://dx.doi.org/10.1016/j.rser.2015.10.124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Jaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.

Full text
Abstract:
Abstract: The smart grid is an evolution of the electrical grid to respond to these challenges. A smart grid is an energy transmission and distribution network enhanced through digital control, monitoring, and telecommunications capabilities. It provides a real-time, two-way flow of energy and information to all stakeholders in the electricity chain, from the generation plant to the commercial, industrial, and residential end user. This evolution is crucial for integrating both renewable and distributed energy resources and to improve the efficiency and sustainability of the electrical grid and associated services. It will also help in other ways, such as enabling:• Smart and positive energy infrastructures• Increased energy density management during peaks• Real-time pricing to customers• Integrated mobility services• New virtual power plants• Micro grid
APA, Harvard, Vancouver, ISO, and other styles
48

Tarasuk, A. V. "CYBER SECURITY SYSTEM SUBJECTS IN UKRAINE." Scientific notes of Taurida National V.I. Vernadsky University. Series: Juridical Sciences 2, no. 2 (2020): 119–24. http://dx.doi.org/10.32838/2707-0581/2020.2-2/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Tekleselase Woldemichael, Hailye. "Emerging Cyber Security Threats in Organization." International Journal of Information and Communication Sciences 5, no. 2 (2020): 19. http://dx.doi.org/10.11648/j.ijics.20200502.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Wallden, Petros, and Elham Kashefi. "Cyber security in the quantum era." Communications of the ACM 62, no. 4 (March 20, 2019): 120. http://dx.doi.org/10.1145/3241037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography