Academic literature on the topic 'Cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity"

1

Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (August 2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.

Full text
Abstract:
This article explores the racial politics underwriting cybersecurity’s recent human turn toward the issues of online disinformation and ‘foreign influence’ in US politics. Through a case study of the Black Lives Matter (BLM) movement, this article’s first half considers how contemporary cybersecurity has produced ‘racial division’ as an object of security by framing the BLM movement as a geopolitical vulnerability open to foreign manipulation through social media. In its emphasis on the political protest as a site of insecurity, I argue that contemporary cybersecurity has widened its traditional spatiality ‘beyond the computer’. In the article’s second half, I argue that the racialization of cybersecurity has underwritten a politics of truth ultimately concerned less with parsing true from false, and more with defining the boundaries of secure political knowledge and communication. I argue that contemporary cybersecurity has produced an idealized subject for whom an obligation to possess contingent forms of knowledge becomes a condition of secure political subjectivity. I conclude with a critique of contemporary cybersecurity’s tendency to portray dissident political movements like BLM as ignorant or disinformed.
APA, Harvard, Vancouver, ISO, and other styles
2

Johri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.

Full text
Abstract:
The annual rate of cybersecurity breaches has risen in the last few years, exposing millions of records in some cases. The average data breach cost in 2021 was a massive $4.24 million. This study examines customer awareness and satisfaction with cybersecurity in the context of the digital transformation of banking in Saudi Arabia. The study is empirical and based on the data collected from 355 banking customers in Saudi Arabia. Three significant aspects of cybersecurity, including cyberattacks, phishing, and hacking, have been analyzed through various dimensions. Customer satisfaction with bank cybersecurity assistance and their expectations of technical support and services on cybersecurity has also been studied. ANOVA and bivariate regression analysis are used to study the impact of cyberattack, phishing, hacking, cybersecurity assistance, and expectations on cybersecurity’s technical awareness on customer satisfaction. The results show that digital transformation has boosted the banking sector, and users benefit from online services. However, an increase in the awareness level of customers on cyberattack, phishing, and hacking activities will influence customers’ satisfaction with digital transactions. The results also revealed that customers need more satisfaction on security level aspects from the bank’s side, and banks should provide regular training programs to safeguard customers from cyberattacks. If banks prepare more secure cybersecurity management, their long-term sustainability goals could be easily achieved.
APA, Harvard, Vancouver, ISO, and other styles
3

Al Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (December 22, 2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.

Full text
Abstract:
In recent years, the number of cyber attacks, virus carriers, and cybercrime on maritime transport facilities has increased significantly. The emergence of new types of maritime vessels, such as autonomous vessels, dependent entirely on information and communication technologies used for passengers, cargo and baggage transportation, requires legal regulation of relations in this area. Therefore, ensuring cybersecurity in maritime transport and the need to adopt appropriate legal norms, standards and measures at both the international and national levels to manage maritime cyber risks are considered one of the most relevant topics for maritime transport. There is no single, systematic integrated approach, unification of requirements and rules in cybersecurity’s sphere of maritime transport [15]. In this regard, the authors analyze the issues of ensuring cybersecurity in maritime transport, the legal basis of security: some international documents and national legal acts, regulating cybersecurity in maritime transport, will be considered, as well as the main question of how they are able to meet modern requirements for ensuring cybersecurity in maritime transport.
APA, Harvard, Vancouver, ISO, and other styles
4

Maurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

CACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Campbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

BOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity"

1

Poluzzi, Lorenzo. "IA & Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
L'integrazione tra Intelligenza Artificiale e Cybersecurity nasce per migliorare l'efficienza, la crescita e la possibilità di rendere sicuro un sistema col minore sforzo, perchè si creino già sistemi di protezione "intelligenti" in grado quindi di essere autonomi nel scovare nuovi attacchi e aggiornarsi, analizzare centinaia e centinaia di dati, traffico e prendere delle decisioni. Analizzerò separatamente diversi concetti di Cybersecurity, I.A. e come sia possibile integrare quest'ultima al fine di innalzare i livelli di sicurezza; si mostrerà anche un esempio pratico di un software (Attack Prophecy) che analizza il traffico della rete e tramite I.A. allerta l'utente e prende decisioni. Lo scopo di questo elaborato è di mettere in relazione Attack Prophecy con un altro Web Application Firewall (WAF) open source tra i più conosciuti chiamato ModSecurity che non integra al suo interno nessun meccanismo di Intelligenza Artificiale, così da avere un confronto tra i due Software e creare resoconto tra i benefici della Cybersecurity classica adoperata senza I.A. e la Cybersecurity impiegata tramite I.A. .
APA, Harvard, Vancouver, ISO, and other styles
2

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Full text
Abstract:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy adherence attitudes and perceived vulnerability to a cyberattack. The second phase of this research used the theory of planned behavior as a theoretical framework to model the relationship between personality facets, policy adherence attitudes, perceived vulnerability, locus of control, cybersecurity climate, and cybersecurity behaviors. While the hypothesized model had poor fit for the data, there was a strong relationship between cybersecurity attitudes (i.e. policy adherence attitudes and perceived vulnerability) and dutifulness, altruism, compliance, cybersecurity climate, and cybersecurity behavior. This research provides practical value to academic researchers and organizations by providing a scale to measure cybersecurity attitudes and to help organizations better understand the nature of the antecedents that lead to cybersecurity attitudes and behavior.
APA, Harvard, Vancouver, ISO, and other styles
3

Lingelbach, Kembley Kay. "Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1056.

Full text
Abstract:
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there exists a significant gap in theoretical framework utilizing qualitative methods to demystify the complex factors of engaging females to pursue the cybersecurity field. This study utilized a grounded theory approach to interview twelve female cybersecurity professionals to discover their perceptions of the cybersecurity field. The participants revealed strategies that could encourage females to pursue the cybersecurity field. Data analysis included a data coding process and a constant comparative method of interview transcripts. This study identified four factors of engagement and one unexpected co-factor that are perceived to have an impact on decisions to pursue the cybersecurity field. The four factors identified were awareness, support, intrinsic and extrinsic values. The interesting find of the cybersecurity mindset profile factor that is perceived to enhance the success of career trajectory warrants additional research to discover the impacts on decision to pursue the cybersecurity field. This findings of this research gives women a voice in recommending strategies to encourage other females to pursue the cybersecurity field. The findings also aid in demystifying the complexity of the factors by organizing and categorizing them in a logical sense in order to present a theoretical model to encourage females into the field of cybersecurity. Moreover, this study provides holistic insight to academicians and practitioners in developing future cybersecurity professionals. Additionally, it adds to the body of knowledge by answering the call for that additional qualitative approaches in methodology by bringing data richness and to generate new theoretical frameworks in cybersecurity research.
APA, Harvard, Vancouver, ISO, and other styles
4

Nilsen, Richard. "Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1017.

Full text
Abstract:
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains that technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. All OISUs, from accountants to cybersecurity forensics experts, can place organizational assets at risk. However, that risk is increased when OISUs do not have the cybersecurity competency necessary for operating an information system (IS). The main goal of this research study was to propose and validate, using subject matter experts (SME), a reliable hands-on prototype assessment tool for measuring the cybersecurity competency of an OISU. To perform this assessment, SMEs validated the critical knowledge, skills, and abilities (KSA) that comprise the cybersecurity competency of OISUs. Primarily using the Delphi approach, this study implemented four phases of data collection using cybersecurity SMEs for proposing and validating OISU: KSAs, KSA measures, KSA measure weights, and cybersecurity competency threshold. A fifth phase of data collection occurred measuring the cybersecurity competency of 54 participants. Phase 1 of this study performed five semi-structured SME interviews before using the Delphi method and anonymous online surveys of 30 cybersecurity SMEs to validate OISU cybersecurity KSAs found in literature and United States government (USG) documents. The results of Phase 1 proposed and validated three OISU cybersecurity abilities, 23 OISU cybersecurity knowledge units (KU), and 22 OISU cybersecurity skill areas (SA). In Phase 2, two rounds of the Delphi method with anonymous online surveys of 15 SMEs were used to propose and validate OISU cybersecurity KSA measures. The results of Phase 2 proposed and validated 90 KSA measures for 47 knowledge topics (KT) and 43 skill tasks (ST). In Phase 3, using the Delphi method with anonymous online surveys, a group of 15 SMEs were used to propose and validate OISU cybersecurity KSA weights. The results of Phase 3 proposed and validated the weights for four knowledge categories (KC) and four skill categories (SC). When Phase 3 was completed, the MyCyberKSAsTM prototype assessment tool was developed using the results of Phases 1-3, and Phase 4 was initiated. In Phase 4, using the Delphi method with anonymous online surveys, a group of 15 SMEs were used to propose and validate an OISU cybersecurity competency threshold (index score) of 80%, which was then integrated into the MyCyberKSAsTM prototype tool. Before initiating Phase 5, the MyCyberKSAsTM prototype tool was fully tested by 10 independent testers to verify the accuracy of data recording by the tool. After testing of the MyCyberKSAsTM prototype tool was completed, Phase 5 of this study was initiated. Phase 5 of this study measured the cybersecurity competency of 54 OISUs using the MyCyberKSAsTM prototype tool. Upon completion of Phase 5, data analysis of the cybersecurity competency results of the 54 OISUs was conducted. Data analysis was conducted in Phase 5 by computing levels of dispersion and one-way analysis of variance (ANOVA). The results of the ANOVA data analysis from Phase 5 revealed that annual cybersecurity training and job function are significant, showing differences in OISU cybersecurity competency. Additionally, ANOVA data analysis from Phase 5 showed that age, cybersecurity certification, gender, and time with company were not significant thus showing no difference in OISU cybersecurity competency. The results of this research study were validated by SMEs as well as the MyCyberKSAsTM prototype tool; and proved that the tool is capable of assessing the cybersecurity competency of an OISU. The ability for organizations to measure the cybersecurity competency of OISUs is critical to lowering risks that could be exploited by cyber threats. Moreover, the ability for organizations to continually measure the cybersecurity competency of OISUs is critical for assessing workforce susceptibility to emerging cyber threats. Furthermore, the ability for organizations to measure the cybersecurity competency of OISUs allows organizations to identify specific weaknesses of OISUs that may require additional training or supervision, thus lowering risks of being exploited by cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
5

Reid, Rayne. "Guidelines for cybersecurity education campaigns." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.

Full text
Abstract:
In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does the chances of a cyber threat finding a vulnerable target increase. All cyber users who are exposed to cyber risks need to be educated about cyber security. Human beings play a key role in the implementation and governing of an entire cybersecurity and cybersafety solution. The effectiveness of any cybersecurity and cybersafety solutions in a societal or individual context is dependent on the human beings involved in the process. If these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in these cybersecurity solutions. It is essential that all users be educated to combat any threats. Children are a particularly vulnerable subgroup within society. They are digital natives and make use of ICT, and online services with increasing frequency, but this does not mean they are knowledgeable about or behaving securely in their cyber activities. Children will be exposed to cyberspace throughout their lifetimes. Therefore, cybersecurity and cybersafety should be taught to children as a life-skill. There is a lack of well-known, comprehensive cybersecurity and cybersafety educational campaigns which target school children. Most existing information security and cybersecurity education campaigns limit their scope. Literature reports mainly on education campaigns focused on primary businesses, government agencies and tertiary education institutions. Additionally, most guidance for the design and implementation of security and safety campaigns: are for an organisational context, only target organisational users, and mostly provide high-level design recommendations. This thesis addressed the lack of guidance for designing and implementing cybersecurity and cybersafety educational campaigns suited to school learners as a target audience. The thesis aimed to offer guidance for designing and implementing education campaigns that educate school learners about cybersecurity and cybersafety. This was done through the implementation of an action research process over a five-year period. The action research process involved cybersecurity and cybersafety educational interventions at multiple schools. A total of 18 actionable guidelines were derived from this research to guide the design and implementation of cybersecurity and cybersafety education campaigns which aim to educate school children.
APA, Harvard, Vancouver, ISO, and other styles
6

Tagert, Adam C. "Cybersecurity Challenges in Developing Nations." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/22.

Full text
Abstract:
This thesis examines the guidance that is being given to developing nations that are rapidly deploying information and communication technologies. It studied the African countries of Rwanda and Tunisia to draw lessons of the situation and potential methods of improving the situation. The thesis found that developing nations are often recommended to implement a conglomeration of existing rules and regulations found in other countries especially in European countries and in the United States. Developing countries are also recommended to create national CERTs, organizations of cybersecurity experts to coordinate a nation to respond to cyber incidents. The proposed rules and regulations are largely irrelevant for developing nations and the proposed missions of a CERT do not match the needs of those countries. In promoting better guidance, the thesis identifies and discusses several challenges. It finds policy makers in developing nations are aware of the cyber threat, and that the cyber threat is different and often smaller in less ICT developed nations even if they are using similar equipment and software. To help craft better recommendations, the thesis identifies the benefits of ICT especially in agriculture, education and government. These benefits are analyzed to determine whether they would be protected by current guidance and the analysis determines that protecting ICT use in government should be the priority. In crafting future guidance the challenges are that nations have differences in ICT architecture and ICT use, and developing nations have fewer resources but also they have different resources to use. Another such difference is the common lack of a private cybersecurity sector and different expectations of government. This thesis concludes with discussing unexpected results. The first is Rwandan policy makers desire good enough security and have a higher risk tolerance concerning cyber threats than is found in more developed nations. In addition, open source software can be a potential way to reduce the cost of cyberspace defense and this thesis makes an initial investigation. The lesson of the thesis is that cybersecurity strategy is not a one size fits all and so it must be customized for each country.
APA, Harvard, Vancouver, ISO, and other styles
7

Falco, Gregory J. "Cybersecurity for urban critical infrastructure." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118226.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Urban Studies and Planning, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 110-116).
Our cities are under attack. Urban critical infrastructure which includes the electric grid, water networks, transportation systems and public health and safety services are constantly being targeted by cyberattacks. Urban critical infrastructure has been increasingly connected to the internet for the purpose of operational convenience and efficiency as part of the growing Industrial Internet of Things (HoT). Unfortunately, when deciding to connect these systems, their cybersecurity was not taken seriously. A hacker can monitor, access and change these systems at their discretion because of the infrastructure's lack of security. This is not only a matter of potential inconvenience. Digital manipulation of these devices can have devastating physical consequences. This dissertation describes three steps cities should take to prepare for cyberattacks and defend themselves accordingly. First, cities must understand how an attacker might compromise its critical infrastructure. In the first chapter, I describe and demonstrate a methodology for enumerating attack vectors across a citys CCTV security system. The attack methodology uses established cybersecurity typologies to develop an attack ruleset for an Al planner that was programmed to perform attack generation. With this, cities can automatically determine all possible approaches hackers can take to compromise their critical infrastructure. Second, cities need to prioritize their cyber risks. There are hundreds of attack permutations for a given system and thousands for a city. In the second chapter, I develop a risk model for urban critical infrastructure. The model helps prioritize vulnerabilities that are frequently exploited for HoT Supervisory Control and Data Acquisition (SCADA) systems. Finally, cities need tools to defend themselves. In the third chapter, I present a nontechnical approach to defending against attacks called cyber negotiation. Cyber negotiation is one of several non-technical cyberdefense tools I call Defensive Social Engineering, where victims can use social engineering against the hacker. Cyber negotiation involves using a negotiation framework to defend against attacks with steps urban critical infrastructure operators can take before, during and after an attack. This study combines computer science and urban planning (Urban Science) to provide a starting point for cities to prepare for and protect themselves against cyberattacks.
by Gregory J. Falco.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
8

Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.

Full text
Abstract:
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 successful business managers with cybersecurity responsibilities working for U.S. DoD contracting companies that successfully hired cybersecurity professionals in Hampton Roads, VA participated in the study. Data collection included semistructured interviews and a review of job postings from the companies represented by the participants. Coding, content, and thematic analysis were the methods used to analyze data. Within-methods triangulation was used to add accuracy to the analysis. At the conclusion of the data analysis, two main themes emerged: maintaining contractual requirements and a strong recruiting process. Contractual requirements guided how hiring managers hired cybersecurity personnel and executed the contract. A strong hiring process added efficiency to the hiring process. The findings of the study may contribute to positive social change by encouraging the recruitment and retention of cybersecurity professionals. Skilled cybersecurity professionals may safeguard businesses and society from Internet crime, thereby encouraging the safe exchange and containment of data.
APA, Harvard, Vancouver, ISO, and other styles
9

Taiola, Matteo. "Cybersecurity in impianti dell'industria di processo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
Nel corso degli ultimi decenni, i processi industriali hanno subito una sempre maggiore automatizzazione e una crescente connessione con reti esterne. Nell’industria di processo, dove il livello di automazione è sempre stato elevato, l’innovazione tecnologica ha richiesto sempre una maggiore interconnessione tra i sistemi di produzione e sistemi esterni di gestione. La connessione dei sistemi ha portato a una crescita economica, ottimizzazione dei processi e un aumento della velocità di produzione, dovuti alla gestione dei controlli del processo e dei dati di funzionamento; ciò però, ha portato anche a esporre l’azienda a rischi per la sicurezza da attacchi informatici. Le minacce alla sicurezza sui sistemi di controllo automatizzato industriale stanno diventando una preoccupazione crescente per tutti gli impianti industriali, in particolare per quelli in cui grandi quantità di sostanze pericolose sono immagazzinate o manipolate. Lo scopo di questa tesi è verificare l’applicabilità e l’efficacia di due metodologie proposte per l’identificazione degli scenari che possono avere luogo in seguito alla manipolazione dannosa (eseguita da remoto o in seguito ad accesso fisico nella sala controllo) del sistema di controllo e sicurezza di un impianto di processo: PHAROS (Process Hazard Analysis of Remote manipulations through the cOntrol System) e POROS (Process Operability analysis of Remote manipulations through the cOntrol System). PHAROS permette d’ identificare gli eventi pericolosi originati dalle apparecchiature di processo, che possono essere innescati attraverso una manipolazione malevola dei BPCS e del SIS; mentre POROS mira all'individuazione dei top event che possono portare all'arresto dell'impianto e alla conseguente interruzione della produttività per un certo periodo di tempo, causata da una manipolazione malevola.
APA, Harvard, Vancouver, ISO, and other styles
10

Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Full text
Abstract:

Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of the damage they cause there are indications that the seriousness of insider incidents are underappreciated as threats by management. The purpose of this research was to investigate who constitutes MI threats, why and how they initiate attacks, the extent to which MI activity can be modeled or predicted, and to suggest some risk mitigation strategies. The results reveal that addressing the Malicious Insider threat is much more than just a technical issue. Dealing effectively with the threat involves managing the dynamic interaction between employees, their work environment and work associates, the systems with which they interact, and organizational policies and procedures. Techniques for detecting and mitigating the threat are available and can be effectively applied. Some of the procedural and technical methods include definition of, follow through, and consistent application of corporate, and dealing with adverse events indigenous to the business environment. Other methods include conduct of a comprehensive Malicious Insider risk assessment, selective monitoring of employees in response to behavioral precursors, minimizing unknown access paths, control of the organization's production software baseline, and effective use of peer reporting.

Keywords: Cybersecurity, Professor Paul Pantani, CERT, insider, threat, IDS, SIEMS. FIM, RBAC, ABAC, behavioral, peer, precursors, access, authentication, predictive, analytics, system, dynamics, demographics.

APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity"

1

Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Price, Tom. Cybersecurity. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 2015. http://dx.doi.org/10.4135/cqr_ht_cybersecurity_2015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marshall, Patrick. Cybersecurity. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 2003. http://dx.doi.org/10.4135/cqrglobal20030926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Daim, Tugrul U., and Marina Dabić, eds. Cybersecurity. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-34843-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Marshall, Patrick. Cybersecurity. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 2010. http://dx.doi.org/10.4135/cqresrre20100226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jøsang, Audun. Cybersecurity. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-68483-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Verma, Rakesh M., and David J. Marchette. Cybersecurity Analytics. Boca Raton, FL : CRC Press, 2020. | Series: Chapman & Hall/CRC data science series: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429326813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity"

1

Wichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 669–80. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-16342-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wichum, Ricky. "Cybersecurity." In Handbuch Virtualität, 1–13. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-16358-7_36-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wolfe, Jennifer C. "Cybersecurity." In Disruption in the Boardroom, 51–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6159-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Refsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management, 29–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roy, Jeffrey. "Cybersecurity." In Public Administration and Information Technology, 59–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7221-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jackson, Scott, and Ricardo Moraes dos Santos. "Cybersecurity." In Systems Approach to the Design of Commercial Aircraft, 57–60. First edition. | Boca Raton, FL : CRC Press, 2020.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003053750-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Siers, Rhea. "Cybersecurity." In Security Studies, 556–68. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Islam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zaffar, Ehsan. "Cybersecurity." In Understanding Homeland Security, 399–439. Abingdon, Oxon; New York. NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780323296243-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maclay, Walter N. "Cybersecurity." In Closing the Care Gap with Wearable Devices, 127–32. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003304036-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity"

1

Kyranoudi, Pinelopi, Nineta Polemi, Paresh Rathod, Ricardo Gregorio Lugo, Sotiris Ioannidis, and Paulinus Ofem. "Sectoral Cybersecurity Skills Gap: The Case of Maritime Cybersecurity Certification Training." In 2024 IEEE International Conference on Engineering, Technology, and Innovation (ICE/ITMC), 1–9. IEEE, 2024. https://doi.org/10.1109/ice/itmc61926.2024.10794272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kemmerer, R. A. "Cybersecurity." In 25th International Conference on Software Engineering, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/icse.2003.1201257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maymí, Fernando J. "Cybersecurity." In SIGITE '19: The 20th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349266.3355613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdulla, Aysha, Omer Bin Hussain, and Numa Fatima. "Cybersecurity." In 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA). IEEE, 2024. http://dx.doi.org/10.1109/acdsa59508.2024.10467741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

de Bruin, Rossouw, and S. H. von Solms. "Humanitarian perspective of cybersecurity and cybersecurity governance." In 2017 IST-Africa Week Conference (IST-Africa). IEEE, 2017. http://dx.doi.org/10.23919/istafrica.2017.8102388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murphy, Diane R., and Richard H. Murphy. "Teaching Cybersecurity." In the 2013. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2528908.2528913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Shouhuai. "Cybersecurity dynamics." In the 2014 Symposium and Bootcamp. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2600176.2600190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khandpur, Rupinder Paul, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, and Naren Ramakrishnan. "Crowdsourcing Cybersecurity." In CIKM '17: ACM Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3132847.3132866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Holley, Buffie, Dan Garcia, and Julia Bernd. "Teaching Cybersecurity." In SIGCSE 2023: The 54th ACM Technical Symposium on Computer Science Education. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3545947.3569637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ohrimenco, Serghei, and Valeriu Cernei. "Cybersecurity risk." In Economic Security in the Context of Systemic Transformations, 3rd Edition. Academy of Economic Studies of Moldova, 2024. http://dx.doi.org/10.53486/escst2023.17.

Full text
Abstract:
This paper presents the multifaceted field of cyber risks, their structure and composition, exploring the challenges posed by the rapid evolution of digital technologies. It highlights the prevalence of cyber risks as a set of activities performed in various sectors of human life, revealing the vulnerabilities faced by individual and collective users, commercial organisations, governments and individuals in today's hyper-connected landscape. The paper emphasises the importance of robust risk management strategies, highlighting the dynamic and persistent nature of cyber threats. A host of relevant international standards, frameworks and cyber risk management techniques to mitigate potential losses are reviewed. Approaches to defining the category of cyber risk are analysed. Daily attack techniques are reviewed. Risk analysis based on a set of reports from leading computer firms has been carried out. The structure of cyber security threats affecting the level of risk is determined. Despite the existing scientific and practical achievements in the field of cyber security, the ever-changing tactics of cyber criminals require constant adaptation of organisational and technical actions and the adoption of a set of proactive measures. Cyber risk management strategies are discussed, which include the selection of possible approaches, taking into account factors such as the level of cyber maturity, available resources, required skills and experience in cyber risk management. The article identifies the most prominent risk management tools, suggests some risk management strategies and advocates a comprehensive approach to cyber security that recognises the inevitability of cyber attacks and the need to build resilience in the face of emerging threats.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity"

1

Florakis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. Cybersecurity Risk. Cambridge, MA: National Bureau of Economic Research, December 2020. http://dx.doi.org/10.3386/w28196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alecu, Iulian, Costel Ciuchi, Toma Cimpeanu, Iulian Coman, Larisa Gabudeanu, Ioan-Cosmin Mihai, Cosmina Moghior, et al. Cybersecurity Guide. Romanian Association for Information Security Assurance, January 2021. http://dx.doi.org/10.19107/cybersec.2021.en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guice, Leslie K. Cybersecurity Laboratory & Cybersecurity Research Program at the CRL. Fort Belvoir, VA: Defense Technical Information Center, August 2014. http://dx.doi.org/10.21236/ada608802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Gaithersburg, MD: National Institute of Standards and Technology, August 2017. http://dx.doi.org/10.6028/nist.sp.800-181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

NIST, Gaithersburg MD. Using the Cybersecurity Framework to Minimize Emergent Cybersecurity Risk:. Gaithersburg, MD: National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.1331.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wright, Virginia, and Marc Sachs. Engineering-In Cybersecurity. Office of Scientific and Technical Information (OSTI), March 2023. http://dx.doi.org/10.2172/1964083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181pt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Newhouse, William, Stephanie Keith, Benjamin Scribner, and Greg Witte. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Spanish translation). National Institute of Standards and Technology, February 2022. http://dx.doi.org/10.6028/nist.sp.800-181es.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Newhouse, Bill. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Ukrainian translation). National Institute of Standard and Technology, May 2022. http://dx.doi.org/10.6028/nist.sp.800-181.ukr.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Newhouse, William. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (French translation). Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-181.fre.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography