To see the other types of publications on this topic, follow the link: Cybersecurity.

Journal articles on the topic 'Cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Whyte, Jeffrey. "Cybersecurity, race, and the politics of truth." Security Dialogue 53, no. 4 (August 2022): 342–62. http://dx.doi.org/10.1177/09670106221101725.

Full text
Abstract:
This article explores the racial politics underwriting cybersecurity’s recent human turn toward the issues of online disinformation and ‘foreign influence’ in US politics. Through a case study of the Black Lives Matter (BLM) movement, this article’s first half considers how contemporary cybersecurity has produced ‘racial division’ as an object of security by framing the BLM movement as a geopolitical vulnerability open to foreign manipulation through social media. In its emphasis on the political protest as a site of insecurity, I argue that contemporary cybersecurity has widened its traditional spatiality ‘beyond the computer’. In the article’s second half, I argue that the racialization of cybersecurity has underwritten a politics of truth ultimately concerned less with parsing true from false, and more with defining the boundaries of secure political knowledge and communication. I argue that contemporary cybersecurity has produced an idealized subject for whom an obligation to possess contingent forms of knowledge becomes a condition of secure political subjectivity. I conclude with a critique of contemporary cybersecurity’s tendency to portray dissident political movements like BLM as ignorant or disinformed.
APA, Harvard, Vancouver, ISO, and other styles
2

Johri, Amar, and Shailendra Kumar. "Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation." Human Behavior and Emerging Technologies 2023 (January 12, 2023): 1–10. http://dx.doi.org/10.1155/2023/2103442.

Full text
Abstract:
The annual rate of cybersecurity breaches has risen in the last few years, exposing millions of records in some cases. The average data breach cost in 2021 was a massive $4.24 million. This study examines customer awareness and satisfaction with cybersecurity in the context of the digital transformation of banking in Saudi Arabia. The study is empirical and based on the data collected from 355 banking customers in Saudi Arabia. Three significant aspects of cybersecurity, including cyberattacks, phishing, and hacking, have been analyzed through various dimensions. Customer satisfaction with bank cybersecurity assistance and their expectations of technical support and services on cybersecurity has also been studied. ANOVA and bivariate regression analysis are used to study the impact of cyberattack, phishing, hacking, cybersecurity assistance, and expectations on cybersecurity’s technical awareness on customer satisfaction. The results show that digital transformation has boosted the banking sector, and users benefit from online services. However, an increase in the awareness level of customers on cyberattack, phishing, and hacking activities will influence customers’ satisfaction with digital transactions. The results also revealed that customers need more satisfaction on security level aspects from the bank’s side, and banks should provide regular training programs to safeguard customers from cyberattacks. If banks prepare more secure cybersecurity management, their long-term sustainability goals could be easily achieved.
APA, Harvard, Vancouver, ISO, and other styles
3

Al Ali, Naser Abdel Raheem, Anna A. Chebotareva, and Vladimir E. Chebotarev. "Cyber security in marine transport." Pomorstvo 35, no. 2 (December 22, 2021): 248–55. http://dx.doi.org/10.31217/p.35.2.7.

Full text
Abstract:
In recent years, the number of cyber attacks, virus carriers, and cybercrime on maritime transport facilities has increased significantly. The emergence of new types of maritime vessels, such as autonomous vessels, dependent entirely on information and communication technologies used for passengers, cargo and baggage transportation, requires legal regulation of relations in this area. Therefore, ensuring cybersecurity in maritime transport and the need to adopt appropriate legal norms, standards and measures at both the international and national levels to manage maritime cyber risks are considered one of the most relevant topics for maritime transport. There is no single, systematic integrated approach, unification of requirements and rules in cybersecurity’s sphere of maritime transport [15]. In this regard, the authors analyze the issues of ensuring cybersecurity in maritime transport, the legal basis of security: some international documents and national legal acts, regulating cybersecurity in maritime transport, will be considered, as well as the main question of how they are able to meet modern requirements for ensuring cybersecurity in maritime transport.
APA, Harvard, Vancouver, ISO, and other styles
4

Maurer, Chris, Kevin Kim, Dan Kim, and Leon A. Kappelman. "Cybersecurity." Communications of the ACM 64, no. 2 (January 25, 2021): 28–30. http://dx.doi.org/10.1145/3399667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 2 (May 12, 2022): 49. http://dx.doi.org/10.1093/itnow/bwac056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 1 (February 17, 2022): 37. http://dx.doi.org/10.1093/itnow/bwac019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pullin, Dennis W. "Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 3–12. http://dx.doi.org/10.1097/hap.0000000000000038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

CACM Staff. "Cybersecurity." Communications of the ACM 60, no. 4 (March 24, 2017): 20–21. http://dx.doi.org/10.1145/3051455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Campbell, Robert D. "Cybersecurity." ACM SIGCSE Bulletin 35, no. 2 (June 2003): 24–26. http://dx.doi.org/10.1145/782941.782965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

BOHATY, ROCHELLE F. H. "CYBERSECURITY." Chemical & Engineering News 86, no. 44 (November 3, 2008): 18–20. http://dx.doi.org/10.1021/cen-v086n044.p018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ratnayake, Deepthi. "Cybersecurity." ITNOW 64, no. 4 (November 21, 2022): 39. http://dx.doi.org/10.1093/combul/bwac124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Agrawal, Garima, Kuntal Pal, Yuli Deng, Huan Liu, and Ying-Chih Chen. "CyberQ: Generating Questions and Answers for Cybersecurity Education Using Knowledge Graph-Augmented LLMs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (March 24, 2024): 23164–72. http://dx.doi.org/10.1609/aaai.v38i21.30362.

Full text
Abstract:
Building a skilled cybersecurity workforce is paramount to building a safer digital world. However, the diverse skill set, constantly emerging vulnerabilities, and deployment of new cyber threats make learning cybersecurity challenging. Traditional education methods struggle to cope with cybersecurity's rapidly evolving landscape and keep students engaged and motivated. Different studies on students' behaviors show that an interactive mode of education by engaging through a question-answering system or dialoguing is one of the most effective learning methodologies. There is a strong need to create advanced AI-enabled education tools to promote interactive learning in cybersecurity. Unfortunately, there are no publicly available standard question-answer datasets to build such systems for students and novice learners to learn cybersecurity concepts, tools, and techniques. The education course material and online question banks are unstructured and need to be validated and updated by domain experts, which is tedious when done manually. In this paper, we propose CyberGen, a novel unification of large language models (LLMs) and knowledge graphs (KG) to generate the questions and answers for cybersecurity automatically. Augmenting the structured knowledge from knowledge graphs in prompts improves factual reasoning and reduces hallucinations in LLMs. We used the knowledge triples from cybersecurity knowledge graphs (AISecKG) to design prompts for ChatGPT and generate questions and answers using different prompting techniques. Our question-answer dataset, CyberQ, contains around 4k pairs of questions and answers. The domain expert manually evaluated the random samples for consistency and correctness. We train the generative model using the CyberQ dataset for question answering task.
APA, Harvard, Vancouver, ISO, and other styles
13

Mwansa, Gardner, Ricky Ngandu, and Onke Khala. "Cyberbullying Prevalence at a Rural Based University in the Eastern Cape, South Africa." International Journal of Social Science Research and Review 6, no. 12 (December 13, 2023): 361–86. http://dx.doi.org/10.47814/ijssrr.v7i1.1783.

Full text
Abstract:
Defences within the digital space against cybersecurity include detection, prevention and response to threats using software tools, however, there no significant technology-based defence systems that deal with cyberbullying related threats. A lack of cybersecurity defence systems and limited cybersecuriy awareness may expose students to cyberbullying and students are likely to suffer, resulting in effects such as psychological and emotional abuse that may eventually contribute towards high drop-outs rates. The objective of this study was to investigate the prevalence of cyberbullying among students at a public university based in the Eastern Cape of South Africa. This research study followed a mixed method approach and a thematic analysis guided by the Theory of Reasoned Action (TRA) theoretical framework. The study found strong cyberbullying penetration within the student community under investigation. As part of the study findings, it was found that activities such as cybersecurity awareness programmes may mitigate the impact of cyberbullying on students and such interventions should form part of any higher education institution’s responsibility.
APA, Harvard, Vancouver, ISO, and other styles
14

Tsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (February 28, 2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment – Vocabulary and general principles. Cybersecurity certification systems and schemes are based on assessment standards, the choice and application of which is not unambiguous and historically has many interpretations and application mechanisms. These standards consist of tools, policies, security concepts, security assurances, guidelines, risk management approaches, best practices, safeguards, and technologies. But they have, to one degree or another, a significant drawback – the complexity of transforming the results of information security assessment according to these standards into security guarantees with any wide international recognition. In the context of globalization, this significantly degrades the cybersecurity quality. The main hypothesis of research is that the cybersecurity quality can be improved by converging towards a common methodology that is based on agreed international standards and international best practice for certification. The question of the key role of cybersecurity for operational technologies, which become the basis for Economy 4.0 and are now considered as a new frontier of cybersecurity, is considered. The need to create a system and schemes for certification of OT cybersecurity based on international and European certification principles is shown. A hierarchical model of cybersecurity certification system assessment standards and a hierarchical model of agreements on mutual recognition of cybersecurity certificates have been developed, which will allow a systematic approach to the creation of a system and schemes for OT cybersecurity certification. This provides an opportunity for developers of systems and certification schemes to form OT cybersecurity certification systems based on the principles of wide cross-border recognition of OT cybersecurity certificates.
APA, Harvard, Vancouver, ISO, and other styles
15

Ulven, Joachim Bjørge, and Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education." Future Internet 13, no. 2 (February 2, 2021): 39. http://dx.doi.org/10.3390/fi13020039.

Full text
Abstract:
The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Model to synthesize research within cybersecurity risk by reviewing existing literature of known assets, threat events, threat actors, and vulnerabilities in higher education. The review included published studies from the last twelve years and aims to expand our understanding of cybersecurity’s critical risk areas. The primary finding was that empirical research on cybersecurity risks in higher education is scarce, and there are large gaps in the literature. Despite this issue, our analysis found a high level of agreement regarding cybersecurity issues among the reviewed sources. This paper synthesizes an overview of mission-critical assets, everyday threat events, proposes a generic threat model, and summarizes common cybersecurity vulnerabilities. This report concludes nine strategic cyber risks with descriptions of frequencies from the compiled dataset and consequence descriptions. The results will serve as input for security practitioners in higher education, and the research contains multiple paths for future work. It will serve as a starting point for security researchers in the sector.
APA, Harvard, Vancouver, ISO, and other styles
16

Morales-Sáenz, Francisco Isaí, José Melchor Medina-Quintero, and Miguel Reyna-Castillo. "Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business." Sustainability 16, no. 14 (July 10, 2024): 5884. http://dx.doi.org/10.3390/su16145884.

Full text
Abstract:
The increase in the use of information technology (IT) poses a challenge derived from the risks and threats of computer security in all areas of society. In this sense, cybersecurity emerges as an important pillar of support for protecting infrastructures essential for countries’ sustainable economic and social development. This paper explores the possible links between cybersecurity and sustainable development within the high-impact scientific literature. The study uses a systematic literature review methodology based on the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol, ensuring a rigorous and structured approach to selecting and analyzing relevant literature. The scientific database Web of Science is used to ensure the integrity and quality of the data collected, following criteria widely validated in this type of methodology. The study reveals a significant interrelationship between cybersecurity and sustainable development in the business sphere. It highlights cybersecurity’s contribution to economic sustainability by protecting critical infrastructure and minimizing financial risks. Concerning environmental sustainability, cybersecurity facilitates the implementation of cleaner and more efficient technology. Social sustainability ensures personal data protection and fosters a culture of responsibility and trust within organizations.
APA, Harvard, Vancouver, ISO, and other styles
17

Rana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 44–48. http://dx.doi.org/10.22214/ijraset.2023.57786.

Full text
Abstract:
Abstract: Machine learning (ML) plays a crucial role in cybersecurity across various aspects of threat detection, prevention, and response. Here are specific roles and applications of machine learning in cybersecurity. Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such a discrepancy has its root cause in the current state of the art, which does not allow us to identify the role of ML in cybersecurity. The full potential of ML will never be unleashed unless its pros and cons are understood by a broad audience. In the computer world, data science is the force behind the recent dramatic changes in cybersecurity's operations and technologies. The secret to making a security system automated and intelligent is to extract patterns or insights related to security incidents from cybersecurity data and construct appropriate data-driven models. Data science, also known as diverse scientific approaches, machine learning techniques, processes, and systems, is the study of actual occurrences via the use of data. Recent breakthroughs in Machine Learning (ML) methods promise new solutions to each of these infamous diversification and asymmetric information problems throughout the constantly increasing vulnerability reporting data-bases. Due to their varied methodologies, those procedures themselves display varying levels of performance. The authors provide a method for cognitive cybersecurity that enhances human cognitive capacity in two ways. To create trustworthy data sets, initially reconcile competing vulnerability reports and then pre-process advanced embedded indicators
APA, Harvard, Vancouver, ISO, and other styles
18

Rana, Prateek. "Role of Machine Learning in Cybersecurity: Techniques and Challenges." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 44–48. http://dx.doi.org/10.22214/ijraset.2024.57786.

Full text
Abstract:
Abstract: Machine learning (ML) plays a crucial role in cybersecurity across various aspects of threat detection, prevention, and response. Here are specific roles and applications of machine learning in cybersecurity. Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such a discrepancy has its root cause in the current state of the art, which does not allow us to identify the role of ML in cybersecurity. The full potential of ML will never be unleashed unless its pros and cons are understood by a broad audience. In the computer world, data science is the force behind the recent dramatic changes in cybersecurity's operations and technologies. The secret to making a security system automated and intelligent is to extract patterns or insights related to security incidents from cybersecurity data and construct appropriate data-driven models. Data science, also known as diverse scientific approaches, machine learning techniques, processes, and systems, is the study of actual occurrences via the use of data. Recent breakthroughs in Machine Learning (ML) methods promise new solutions to each of these infamous diversification and asymmetric information problems throughout the constantly increasing vulnerability reporting data-bases. Due to their varied methodologies, those procedures themselves display varying levels of performance. The authors provide a method for cognitive cybersecurity that enhances human cognitive capacity in two ways. To create trustworthy data sets, initially reconcile competing vulnerability reports and then pre-process advanced embedded indicators
APA, Harvard, Vancouver, ISO, and other styles
19

POPESCU, Eugen F. "Complementary Cybersecurity." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 33–37. http://dx.doi.org/10.19107/ijisc.2020.02.05.

Full text
Abstract:
The paper presents the need for enhancing the classical Cybersecurity domain of study with a set of complementary perspectives that are meant to support and facilitate a proper long-term human evolution, as well as a balanced and healthy environment. It describes the influence of human decisions on the technology, in its entire lifecycle, and likewise the technological feedback that is experienced both by the human and the nature, in return. It emphasizes the need for profound analysis of the influences that technology brings on humans – as individuals and as society – and on the surrounding environment. In the same time, it points towards the importance of adaptation of our daily lives to the technological advancements. The paper concludes with a set of necessities for raising the awareness and knowledge on these matters, in order to document and support the decisions that shape our realities.
APA, Harvard, Vancouver, ISO, and other styles
20

Oleinik, Margarita, and Tatyana Porubel. "Agroholdings cybersecurity." Proceedings of the Kuban State Agrarian University 1, no. 78 (2019): 33–41. http://dx.doi.org/10.21515/1999-1703-78-33-41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Voas, Jeffrey. "Crying “Cybersecurity!”." Computer 55, no. 10 (October 2022): 14–15. http://dx.doi.org/10.1109/mc.2022.3178862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ratnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 2 (June 1, 2021): 41. http://dx.doi.org/10.1093/itnow/bwab052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ratnayake, Deepthi. "Insight: Cybersecurity." ITNOW 63, no. 3 (August 16, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Gritzalis, Dimitris A., Grammati Pantziou, and Rodrigo Román-Castro. "Sensors Cybersecurity." Sensors 21, no. 5 (March 4, 2021): 1762. http://dx.doi.org/10.3390/s21051762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ratnayake, Deepthi. "Insight: cybersecurity." ITNOW 63, no. 4 (December 1, 2021): 39. http://dx.doi.org/10.1093/itnow/bwab118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Maconachy, W. V., and D. Kinsey. "Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 4. http://dx.doi.org/10.53735/cisse.v9i1.138.

Full text
Abstract:
Recent cyber events within the U. S. cyber ecosystem present the alarming fact that attacks with both denial of service and kinetic consequences are now prevalent in non-governmental systems. This paper examines the need to expand studies of cyber and other warfare modalities into the cybersecurity curricula now being taught in American universities.
APA, Harvard, Vancouver, ISO, and other styles
27

Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview/835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. "Defining Cybersecurity." Technology Innovation Management Review 4, no. 10 (October 30, 2014): 13–21. http://dx.doi.org/10.22215/timreview835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Baranchuk, Adrian, Bryce Alexander, Debra Campbell, Sohaib Haseeb, Damian Redfearn, Chris Simpson, and Ben Glover. "Pacemaker Cybersecurity." Circulation 138, no. 12 (September 18, 2018): 1272–73. http://dx.doi.org/10.1161/circulationaha.118.035261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Reagin, Michael J., and Michael V. Gentry. "Enterprise Cybersecurity." Frontiers of Health Services Management 35, no. 1 (2018): 13–22. http://dx.doi.org/10.1097/hap.0000000000000037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Radziwill, Nicole M. "Cybersecurity Leadership." Quality Management Journal 25, no. 2 (April 3, 2018): 109. http://dx.doi.org/10.1080/10686967.2018.1436356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kim, Lee. "Cybersecurity awareness." Nursing 47, no. 6 (June 2017): 65–67. http://dx.doi.org/10.1097/01.nurse.0000516242.05454.b4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Talbot, Edward B., Deborah Frincke, and Matt Bishop. "Demythifying Cybersecurity." IEEE Security & Privacy Magazine 8, no. 3 (May 2010): 56–59. http://dx.doi.org/10.1109/msp.2010.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lukowiak, Marcin, Stanisław Radziszowski, James Vallino, and Christopher Wood. "Cybersecurity Education." ACM Transactions on Computing Education 14, no. 1 (March 2014): 1–20. http://dx.doi.org/10.1145/2538029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, Lee. "Cybersecurity awareness." Nursing Management (Springhouse) 48, no. 4 (April 2017): 16–19. http://dx.doi.org/10.1097/01.numa.0000514066.30572.f3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kim, Lee. "Cybersecurity matters." Nursing Management (Springhouse) 49, no. 2 (February 2018): 16–22. http://dx.doi.org/10.1097/01.numa.0000529921.97762.be.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kuhn, Rick. "Introduction: Cybersecurity." IT Professional 12, no. 4 (July 2010): 18–19. http://dx.doi.org/10.1109/mitp.2010.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

AlDaajeh, Saleh, and Saed Alrabaee. "Strategic cybersecurity." Computers & Security 141 (June 2024): 103845. http://dx.doi.org/10.1016/j.cose.2024.103845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wadia, Reena. "Cybersecurity threats." British Dental Journal 237, no. 10 (November 22, 2024): 793. http://dx.doi.org/10.1038/s41415-024-8121-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Nesterov, E. A., and V. Ya Tsvetkov. "Transport Cybersecurity." World of Transport and Transportation 21, no. 6 (August 16, 2024): 103–9. http://dx.doi.org/10.30932/1992-3252-2023-21-6-12.

Full text
Abstract:
A feature of the digital transformation of the transport industry is the trend to increased number of cyberattacks that are among the information threats. Transport cybersecurity is a broader phenomenon compared to cyberattacks and information security. It includes organisational security and other types of security that are not found purely in the information field. The relevance of transport cybersecurity is additionally due to the widespread use of information and computer networks and information space. Cyberspace in the transport sector can be interpreted as an aggregate of networks, information space, communication and real environment. The inclusion of real environment in transport cyberspace is a distinctive feature of transport cyberspace. The growth of information threats occurs regardless of development of transport cyberspace. It is due to digitalisation of society, including the transport sector. Cyberspace creates the preconditions for cyberthreats of a new quality, and for new cyberthreats, previous methods of information security become ineffective. The emergence of information threats is dictated not so much by digitalisation, but rather by the openness of information and communication technology. Multimodal transportation as a relationship between many organisations also contributes to the growth of cyberthreats and a decrease in information security. The article provides an analysis of the state and approaches used in transport cybersecurity based on the review of publications on the topic, suggests a taxonomy of threats and risks to transport cybersecurity, introduces the concepts of «railway information» and «transport information», describes the vulnerabilities of transport cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
41

Khan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (October 7, 2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.

Full text
Abstract:
Technology is advancing at a very high speed, becoming more sophisticated and complex. Similarly, due to the vastness of the digital world, cyber threats have also increased in complexity and frequency. The rapid advancement of technology has brought unprecedented conveniences but also significant risks. Therefore, security awareness is essential for every individual and organization. Cyber threats such as phishing attacks, malware attacks, social engineering, Denial of service attacks, and insider threats have become sophisticated, proving to be a challenge to individuals and organizations. This paper evaluates security awareness in the organization with a keen interest in why the program is essential, the components of the program, challenges that might be faced while implementing the program, and what role the organization and employees have to play to ensure the environment is secure. The paper provides a comprehensive analysis highlighting the importance of security awareness in an organization's current sophisticated digital world. Keywords - Security Awareness, Cyber Threats, Phishing, Malware, Social Engineering, Information Security, Cybersecurity Training, Risk Mitigation, and Continuous Education.
APA, Harvard, Vancouver, ISO, and other styles
42

Gołębiowska, Anna, and Dariusz Prokopowicz. "CYBER SECURITY AND OTHER DETERMINANTS OF THE INTERNETIZATION OF LOCAL AND MUNICIPAL MAGAZINES." Zeszyty Naukowe SGSP 87 (September 29, 2023): 219–46. http://dx.doi.org/10.5604/01.3001.0053.9119.

Full text
Abstract:
The main purpose of this article was to point out the growing importance of the issue of cybersecurityin the use of new Internet media in the development of electronic local and local governmentmagazines. This article identifies the importance and impact of the development of new onlinemedia in the process of digitization of documents and the development of electronic, digital versionsof local and self-government magazines. In the context of the conducted research, the followingresearch thesis was formulated: The development of cybercrime related to the theft of sensitivedata on the Internet defines the need for continuous improvement of cybersecurity techniques andinstruments. Improving the cybersecurity in the use of new Internet media is an important factorin the development of electronic and online local and self-government magazines. New onlinemedia, including social media, have become one of the key factors in the current information andsocial globalization. The SARS-CoV-2 coronavirus pandemic significantly accelerated the processesof digitization of the economy and the Internetization of remote communication processes. Theconclusions from the conducted research confirm the main research thesis. The analysis proves thatthere is a fundamental relationship between the improvement of cybersecurity techniques and theprocess of digitization and Internetization of the media, including press media. The article indicatesthe growing importance of cybersecurity in the use of new Internet media in the development ofelectronic local and local government magazines. The considerations and results of the analysescontained in the article confirm the thesis that the development of cybercriminal theft of sensitivedata on the Internet forces the need for continuous improvement of cybersecurity techniques andinstruments. Improvement of the cybersecurity in the use of new Internet media also concerns thedevelopment of electronic and online local and self-government magazines. The text shows theimportance of the role of the Coronavirus pandemic, which occurred in March 2020, in acceleratingthe process of the Internetization of journals.
APA, Harvard, Vancouver, ISO, and other styles
43

Panchamia, Virti, Archita Harchwani, and Tirath Momaya. "Cybersecurity Renaissance: Navigating Threats, Ethical Hacking, and Risk Mitigation in the Digital Era." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (January 15, 2024): 1–10. http://dx.doi.org/10.55041/ijsrem28181.

Full text
Abstract:
Cybercrime has evolved into a $1.5 trillion industry, mirroring legitimate organizations. Despite its recent surge, cybercrime is not a novel threat, dating back centuries. The inaugural cyber attack occurred in 1834 in France, exposing the French telegraph system. The mid-20th century marked cybercrime's emergence, notably with Allen Scherr's 1962 attack on MIT. The '90s ushered in communication technology but also increased cyber threats. The 2000s witnessed more sophisticated attacks, with APTs sponsored by nation- states. The 2010s saw a surge in cybercrime, spawning a parallel growth in cybersecurity jobs and ethical hacking. Notable attacks include Stuxnet in 2010 and the SamSam ransomware in 2015. The 2020s witnessed substantial losses, such as the SolarWinds breach in 2020 and the Colonial Pipeline attack in 2021. The abstract underscores the importance of cybersecurity in safeguarding data from theft and damage. With rising cyber threats, reliance on out-of-the-box solutions is insufficient. A comprehensive approach, including cybersecurity awareness training, is crucial. The global shift towards digital dependence emphasizes the need for robust cybersecurity measures, encompassing all fields to protect against potential data breaches. Cybersecurity's significance is escalating as technology reliance grows, demanding a comprehensive defense strategy. Cyber risk mitigation involves policies, technologies, and procedures to reduce the likelihood and impact of cyber attacks. Challenges include inadequate visibility, manual processes, and resource limitations. The benefits encompass timely risk identification, fewer vulnerabilities, improved security compliance, enhanced brand reputation, and increased revenue. Cyber risk mitigation is pivotal for organizations aiming to navigate the evolving threat landscape successfully. International Journal of Scientific Research in Engineering and Management (IJSREM) Volume: 08 Issue: 01 | January - 2024 SJIF Rating: 8.176 ISSN: 2582-3930 © 2024, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM28181 | Page 2 Keywords: Cybercrime,Evolution,Inaugural attack,APTs,Cybersecurity jobs,Cybersecurity awareness,Risk mitigation
APA, Harvard, Vancouver, ISO, and other styles
44

Burley, Diana L., Jon Eisenberg, and Seymour E. Goodman. "Would cybersecurity professionalization help address the cybersecurity crisis?" Communications of the ACM 57, no. 2 (February 2014): 24–27. http://dx.doi.org/10.1145/2556936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Tewari, Shweta. "Cryptocurrency and Cybersecurity." International Journal of Scientific Engineering and Research 6, no. 1 (January 27, 2018): 49. https://doi.org/10.70729/ijser172242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Perälä, Piia, and Martti Lehto. "Educating Cybersecurity Experts: Analysis of Cybersecurity Education in Finnish Universities." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 371–78. http://dx.doi.org/10.34190/eccws.23.1.2256.

Full text
Abstract:
Cybersecurity is no longer just a technical discipline but a strategic concept. Nowadays, cybersecurity has become an essential part of national security strategies. The European Union and European countries have established cybersecurity strategies to strengthen European and national resilience against cyber threats and ensure that citizens and businesses can take full advantage of reliable services and digital tools. A wide range of actors in society, from both government and non-government sectors, are already involved in cybersecurity work. However, there is a constant need to increase the workforce of cybersecurity specialists to manage cybersecurity risks. Finland's cybersecurity strategy emphasizes the importance of developing cybersecurity education to address the cybersecurity risks the country faces. For the nation to achieve cyber self-sufficiency, the pool of cybersecurity specialists should include experts in every knowledge area relevant to various aspects of cybersecurity. Universities have a role in training cybersecurity specialists through their education programs. Consequently, universities should offer comprehensive education encompassing all cybersecurity knowledge areas. This paper aims to overview the state of cybersecurity education in Finland's universities by focusing on cybersecurity education content. By analysing the content of the universities' cybersecurity education, the aim was to understand how current education in Finland meets the cybersecurity knowledge areas of the European Cybersecurity Taxonomy. In spring 2023, data on cybersecurity degree programs and courses were collected through surveys from nine Finnish universities providing cybersecurity education. As a result, we gained an understanding of the capability of Finnish university-level cybersecurity education to offer specialists in different domain areas of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
47

P, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 24, 2024): 1–5. https://doi.org/10.55041/ijsrem40065.

Full text
Abstract:
This article presents an empirical study evaluating the effectiveness of the CyberSecurity Audit Model (CSAM 2.0) at a Canadian higher education institution. CSAM 2.0 is a comprehensive model used to assess cybersecurity assurance, maturity, and readiness in medium to large organizations and at the national level. It allows for the effective evaluation of security controls across various cybersecurity domains. The study highlights global best practices in cybersecurity audits, highlighting the lack of standardized guidelines and weaknesses in cybersecurity training programs. The paper details CSAM 2.0's structure and architecture, sharing results from three research scenarios: (1) a single audit focusing on awareness education, (2) audits in multiple domains such as governance, legal compliance, and incident management, and (3) a full audit covering all model domains. The study concludes that CSAM 2.0 offers valuable insights for improving cybersecurity practices and addressing vulnerabilities. Keywords: Cybersecurity, Cybersecurity Audits, Cybersecurity Audit Model, Cybersecurity Assurance, Cybersecurity Maturity, Control Evaluation, Risk Management, Incident Response, Cybersecurity Domains, Cybersecurity Training.
APA, Harvard, Vancouver, ISO, and other styles
48

Crabb, James, Clemente Izurieta, Bernard Van Wie, Olusola Adesope, and Assefaw Gebremedhin. "Cybersecurity Education: Insights From a Novel Cybersecurity Summer Workshop." IEEE Security & Privacy 22, no. 6 (November 2024): 89–98. https://doi.org/10.1109/msec.2024.3473188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Heinl, Caitríona H. "Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime." Asia Policy 18, no. 1 (2014): 131–59. http://dx.doi.org/10.1353/asp.2014.0026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Li, He, Won Gyun No, and Tawei Wang. "SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors." International Journal of Accounting Information Systems 30 (September 2018): 40–55. http://dx.doi.org/10.1016/j.accinf.2018.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography