To see the other types of publications on this topic, follow the link: National Cyber Security Centre (NCSC).

Journal articles on the topic 'National Cyber Security Centre (NCSC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'National Cyber Security Centre (NCSC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mackay, Matthew. "Cyber risk assessment in a post-IS1 world." ITNOW 63, no. 4 (2021): 52. http://dx.doi.org/10.1093/itnow/bwab124.

Full text
Abstract:
Abstract Matthew Mackay CITP MBCS, Principal Consultant at Logiq Consulting, discusses how cyber risk assessments have changed following the withdrawal of Information Standard 1 (IS1) by the National Cyber Security Centre (NCSC) for use within government projects.
APA, Harvard, Vancouver, ISO, and other styles
2

Farisin, Mokhamad Saiful. "Menjaga Keamanan Digital Strategi serta Kebijakan Swiss dalam Mengatasi Ancaman Ransomware." Interdependence Journal of International Studies 6, no. 1 (2025): 69–80. https://doi.org/10.54144/ijis.v6i1.78.

Full text
Abstract:
Ancaman terhadap keamanan siber telah meningkat secara signifikan di seluruh dunia, termasuk di Eropa. Salah satu negara yang terkena dampaknya adalah Swiss, di mana serangan ransomware telah menyasar berbagai sektor, mulai dari perusahaan swasta hingga lembaga perbankan secara luas. Penelitian ini bertujuan untuk menganalisis strategi dan kebijakan yang diterapkan oleh Swiss untuk menghadapi tantangan tersebut. Metode penelitian yang digunakan adalah deskriptif, dengan pengumpulan data melalui studi pustaka. Hasil penelitian menunjukkan bahwa Swiss telah mengadopsi dua strategi utama dalam ke
APA, Harvard, Vancouver, ISO, and other styles
3

Gonsales, Priscila, Susan Halford, and Dale Southerton. "Pesquisa em futuros sociodigitais: reivindicações e affordances em evidência." Linhas Crí­ticas 30 (October 24, 2024): e54168. https://doi.org/10.26512/lc30202454168.

Full text
Abstract:
Susan Halford e Dale Southerton, pesquisadores e professores titulares da Universidade de Bristol, dividem a coordenação do Centro de Pesquisa em Futuros Sociodigitais (CenSoF), criado em 2022, com financiamento de 10 milhões de libras do Economic and Social Research Council (ESRC). Trata-se de uma iniciativa que reúne pesquisadores de diferentes áreas do conhecimento de doze universidades do Reino Unido, de outras cinco universidades internacionais (da Itália, Noruega, Austrália, Estados Unidos e África do Sul), além de parceiros organizacionais não acadêmicos como o UK Department for Food an
APA, Harvard, Vancouver, ISO, and other styles
4

Ikuero, F. E. "Preliminary review of cybersecurity coordination in Nigeria." Nigerian Journal of Technology 41, no. 3 (2022): 521–26. http://dx.doi.org/10.4314/njt.v41i3.11.

Full text
Abstract:
Cyberspace presents significant opportunities that enhance communication, and boost business and socio-economic prosperity in Nigeria. While cyber criminals thrive to exploit any vulnerability for their gains, the Nigeria Government has taken some measures to safeguard its cyberspace. This study evaluates the efforts of the Nigeria Government in the coordination of cybersecurity in the country. It used secondary source methodology by reviewing previous and related research works including books, articles among others. The study found that Nigeria has established a national Computer Emergency R
APA, Harvard, Vancouver, ISO, and other styles
5

Sudhip, S., I. Roshan Singha, and Mohammad Atif. "Indian Cyber Security and Defence: A Comprehensive Analysis." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2544–47. https://doi.org/10.22214/ijraset.2025.67872.

Full text
Abstract:
Abstract: The rapid digitization of India’s economy, governance, and military infrastructure has made cybersecurity a critical pillar of national security. With increasing cyber threats from state-sponsored actors, hacktivists, and cybercriminals, India has been actively strengthening its cyber defence mechanisms. This research paper provides an in-depth analysis of India’s cybersecurity and defence policies, institutional frameworks, and operational strategies. It examines the roles of key agencies such as the Indian Computer Emergency Response Team (CERT-In), the National Cyber Security Coor
APA, Harvard, Vancouver, ISO, and other styles
6

Turk, Žiga, Muammer Semih Sonkor, and Robert Klinc. "CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK." JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, no. 5 (2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.

Full text
Abstract:
Digitalisation of the construction industry is exposing it to cybersecurity risks. All phases of construction can be affected. Particularly vulnerable are information-intensive phases such as building design and building operation. Construction is among the last industries that are discovering its cybersecurity risks and can rely on frameworks developed for other contexts. In this paper, we evaluate the cybersecurity risks of the design phase of construction using the Cyber Assessment Framework from the National Cybersecurity Centre (NCSC) of the UK. The goal of this study is twofold. First, t
APA, Harvard, Vancouver, ISO, and other styles
7

Urbanovics, Anna, and Péter Sasvári. "Az Egyesült Királyságban működő kiberbiztonsági képzésekbe bevont oktatók tudományos teljesítményének elemzése." Információs Társadalom 18, no. 3-4 (2019): 105. http://dx.doi.org/10.22503/inftars.xviii.2018.3-4.5.

Full text
Abstract:
A mai digitalizált világban, amelyben az ügyintézés jelentős része az online felületekhez köthető, az információs rendszerek biztonsága még hangsúlyosabbá vált. A kiberbiztonság megvalósítására több országban állami szinten készítettek átfogó stratégiát, amelyben kiemelkedő szerep jut a kiberbiztonsági szakemberek képzésének. Az Egyesült Királyságban működő Nemzeti Kiberbiztonsági Központ egységes képzési programot alkotott meg azon egyetemek számára, amelyek kiberbiztonságot oktatnak. A dolgozat célja, hogy a brit egyetemek kiberbiztonsági képzéseit vizsgálja és hasonlítsa össze egymással. Az
APA, Harvard, Vancouver, ISO, and other styles
8

Urbanovics, Anna, and Peter Sasvari. "Cyber Security Master's degrees in the United Kingdom: a comparative analysis." Central and Eastern European eDem and eGov Days 338 (July 15, 2020): 161–71. http://dx.doi.org/10.24989/ocg.338.13.

Full text
Abstract:
In today’s digitized world, where most of our activities are related to online platforms, the information security has become more essential than ever. Most countries have launched national strategies for the implementation of cyber security. In these, the education and training of information security professionals get particular roles. The National Cyber Security Centre created a common framework for cyber security education in the United Kingdom for the universities offering degrees in information security. The aim of this paper is to examine and compare the British cyber security degrees.
APA, Harvard, Vancouver, ISO, and other styles
9

Cantika, Suci, and Annisa Umniyah. "Analysis of the Australian Government’s Security Strategy in Countering the Potential Threat of Terrorism Groups Through Cyber Terrorism Instruments." Insignia: Journal of International Relations 10, no. 2 (2023): 214. http://dx.doi.org/10.20884/1.ins.2023.10.2.9376.

Full text
Abstract:
This paper discusses the strategies adopted by Australia in dealing with and overcoming the violent acts of Cyber Terrorism. Since the terrorist attack on September 11, 2001 in the United States, countries in the world have assumed the existence of terrorist groups as a global threat. Globalization has enabled the terrorist groups to transform conventional media in the cyber world into the infamous cyber terrorism which they use as a propaganda instrument for recruitment, providing logistics, training, forming paramilitaries, planning, carrying out attacks, hiding, and funding. This paper disc
APA, Harvard, Vancouver, ISO, and other styles
10

VASILEVA, Violeta, and Veselina ALEKSANDROVA GAGAMOVA. "Application of NATO Models for Building Information Infrastructure in Crisis Situations." Romanian Military Thinking 2024, no. 4 (2024): 232–47. https://doi.org/10.55535/rmt.2024.4.15.

Full text
Abstract:
The effective functioning of the national security system during disasters, accidents and other crisis situations related to cyber security and cyber defence requires the realization of opportunities for inter-institutional interaction of all elements of the system. This paper presents certain opportunities as part of the methodology to apply NATO models to develop the system design of information infrastructure with capabilities to achieve the required levels of operational interoperability to respond to cyber threats to national security. For the architectural configuration, the NATO Technic
APA, Harvard, Vancouver, ISO, and other styles
11

VASILEVA, Violeta, and Veselina ALEKSANDROVA GAGAMOVA. "Aplicarea modelelor NATO pentru constituirea infrastructurii informaționale în situații de criză." Gândirea Militară Românească 2024, no. 4 (2024): 226–43. https://doi.org/10.55535/gmr.2024.4.14.

Full text
Abstract:
The effective functioning of the national security system during disasters, accidents and other crisis situations related to cyber security and cyber defence requires the realization of opportunities for inter-institutional interaction of all elements of the system. This paper presents certain opportunities as part of the methodology to apply NATO models to develop the system design of information infrastructure with capabilities to achieve the required levels of operational interoperability to respond to cyber threats to national security. For the architectural configuration, the NATO Technic
APA, Harvard, Vancouver, ISO, and other styles
12

Mori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.

Full text
Abstract:
The damages caused by cyber-attacks are becoming larger, broader and more serious and to include monetary losses and losses of lifeline. Some cyber-attacks are arguably suspected to be parts of national campaigns. Under such circumstances, the public sector must endeavour to enhance the national cybersecurity capacities. There are several benchmarks for national cybersecurity, i.e., a snapshot relative assessment of a nation’s cybersecurity strength at a global level. However, by considering the development of technology, attackers’ skills and capacities of other nations, we believe that it is
APA, Harvard, Vancouver, ISO, and other styles
13

Neal, Patrick. "Information Through the Lens of Safety and Security." Journal of Intelligence, Conflict, and Warfare 6, no. 1 (2023): 64–67. http://dx.doi.org/10.21810/jicw.v6i1.5407.

Full text
Abstract:
On April 20, 2023, Dr. Patrick Neal, Senior Research Fellow at the Canadian Centre for Identity-Based Conflict and Vice President of Cyber Research at CASIS Vancouver, presented Information Through the Lens of Safety and Security at the April 2023 CASIS Digital Roundtable. The presentation was followed by a question-and-answer period with questions from the audience. The key points discussed were how information has shifted to shape culture, the future evolution of Public and National Safety, and transformations in technology from language analysis. Received: 2023-05-11 Revised: 2023-05-12
APA, Harvard, Vancouver, ISO, and other styles
14

Brovchenko, Y. "SOME ISSUES FROM THE EXPERIENCE OF EUROPEAN UNION COUNTRIES RELATING TO COUNTERACTION TO COLLABORATIVE ACTIVITIES IN UKRAINE." Scientific heritage, no. 159 (April 27, 2025): 43–51. https://doi.org/10.5281/zenodo.15292294.

Full text
Abstract:
The article examines key areas of adaptation of international and European experience in countering collaborationism in the context of the formation of modern administrative and legal policy of Ukraine. Particular attention is paid to the analysis of international legal acts regulating the countering of collaborationism, in particular the provisions of the IV Geneva Convention, its Additional Protocols, the International Covenant on Civil and Political Rights and the Rome Statute of the International Criminal Court. The competence of international institutions — the ICC, the ECHR, the UN
APA, Harvard, Vancouver, ISO, and other styles
15

Zvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.

Full text
Abstract:
The focus of the article revolves around NATO’s roadmap of smart defense against cyber attacks as the bedrock of Euro-Atlantic security. The author discloses NATO’S new policy and cutting-edge technical initiatives, aimed at focusing on countering global threats and cyber security challenges. It is stressed out, that new ideas towards a more synergetic approach between all the NATO Cyber Defense agencies should be explored to develop a shared framework for cybersecurity that might provide up-to-the date intelligence in order to ensure the development, acquisition and maintenance of the necessa
APA, Harvard, Vancouver, ISO, and other styles
16

Kosiński, Jerzy, Tomasz Gontarz, and Robert Kośla. "Cybersecurity and the Handling of Cyber Incidents." Internal Security 10, no. 2 (2019): 107–28. http://dx.doi.org/10.5604/01.3001.0013.4219.

Full text
Abstract:
The article presents interpretations of the concepts of cybersecurity and cybercrime as well as the abuse of the term cybernetic. The author refers to information as a new “centre of gravity” of the nation’s power and special attention is paid to activities aimed at ensuring a high level of information security in Poland. The assumptions of the draft Act on the national cybersecurity system are described and particular emphasis is placed on the issues of technical and organisational reporting and the handling of ICT security incidents. The author points out that handling incidents violating cy
APA, Harvard, Vancouver, ISO, and other styles
17

Orlovskyi, Ruslan Semenovych, and Vasyl Mykhailovych Kozak. "Criminal law protection of state secrets in the context of hybrid warfare." Kriminologija & socijalna integracija 33, no. 1 (2025): 85–106. https://doi.org/10.31299/ksi.33.1.5.

Full text
Abstract:
In the context of information warfare, the contemporary security environment is evolving quickly. The protection of secrets has emerged as a crucial element of national security, particularly for Ukraine, which has been dealing with a growing number of hybrid threats and overt military activities by the Russian Federation since 2014. Such security issues have highlighted the gaps in Ukrainian legislation and institutional architecture for the preservation of secrets. With an emphasis on legislative frameworks, classification processes, enforcement strategies, and global best practices, this pa
APA, Harvard, Vancouver, ISO, and other styles
18

Yankova, Alexandra. "Architecture of China’s Cyber Sovereignty Concept (Based on the Reports World Internet Conference “Sovereignty in Cyberspace: Theory and Practice”." Problemy dalnego vostoka, no. 4 (2023): 99. http://dx.doi.org/10.31857/s013128120026886-5.

Full text
Abstract:
Modern China shares the position that national security is impossible without network security. The state builds cyber diplomacy based on the traditional dominants of its foreign policy — inviolability of borders, non-interference, respect for sovereignty. Naturally expanding into the digital space, the last of them has acquired a new form of cyber-sovereignty, become an integral part of the Chinese discursive force and the cornerstone of the PRC’s approach to global Internet governance. Beijing, not satisfied with the current unfair digital world order and concerned about the need to ensure c
APA, Harvard, Vancouver, ISO, and other styles
19

Ibitamuno, Pamela Victor. "Legal Frameworks for Cybersecurity in Nigeria - Adapting The Fourth Industrial Revolution." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (2023): 97–104. http://dx.doi.org/10.22624/aims/csean-smart2023p12.

Full text
Abstract:
In this article titled "The Legal Framework for Cybersecurity in Nigeria: Adapting the Fourth Industrial Revolution," the author explores the legal landscape governing cybersecurity in Nigeria in the context of the Fourth Industrial Revolution (Industry 4.0). The Fourth Industrial Revolution is characterized by the integration of digital technologies such as the Internet of Things, cyber-physical systems, and cloud computing, which has created a hyper-connected system. As this revolution progresses, cybersecurity becomes critical to ensuring the security of the digital space. The article empha
APA, Harvard, Vancouver, ISO, and other styles
20

Maina, Lucy W., and Godfred Ohndyl Otieno. "Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya." East African Journal of Information Technology 7, no. 1 (2024): 81–91. http://dx.doi.org/10.37284/eajit.7.1.1757.

Full text
Abstract:
Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independenc
APA, Harvard, Vancouver, ISO, and other styles
21

Ocieczek, Grzegorz. "The Internal Security Agency and Poland’s Critical Infrastructure Protection: Challenges and Solutions." European Integration Studies 20, no. 2 (2024): 319–43. https://doi.org/10.46941/2024.2.13.

Full text
Abstract:
This article is devoted to critical infrastructure protection issues, with a focus on national regulations. It does not omit issues concerning the authorities which, according to the regulations, are responsible for critical infrastructure protection, including: relevant ministers, the Government Security Centre as well as the Internal Security Agency. The publication also presents issues related to ensuring information and communication technology security and countering terrorist threats, espionage and cyber-attacks. The empirical aspect of citing an excerpt from a research on terrorism, whi
APA, Harvard, Vancouver, ISO, and other styles
22

Sogo, Angel Olofinbiyi. "A reassessment of public awareness and legislative framework on cybersecurity in South Africa." ScienceRise: Juridical Science, no. 2(20) (June 30, 2022): 34–42. https://doi.org/10.15587/2523-4153.2022.259764.

Full text
Abstract:
Cybersecurity has become a growing concern globally, following this era of unparalleled resources, power relations and technological evolution. Technological vulnerabilities have led to massive data breaches in recent years and research has highlighted potential uses of artificial intelligence to engineer more powerful cyber-attacks thus revealing new hardware weaknesses. Cyber-attacks pose a threat to critical infrastructure thereby compelling countries to intensify their national security testing for cross-border partnerships. South Africa, however, is lagging in terms of readiness and capac
APA, Harvard, Vancouver, ISO, and other styles
23

Semenenko, Oleh, Uzef Dobrovolskyi, Maryna Sliusarenko, Ihor Levchenko, and Serhii Mytchenko. "Legal aspects of the cybertechnology development and the cyberweapon use in the state defence sphere: Global and Ukrainian experience." Social Legal Studios 6, no. 4 (2023): 192–99. http://dx.doi.org/10.32518/sals4.2023.192.

Full text
Abstract:
The research relevance is determined by the development of the digital sphere, which entails an increase in the number of cybercrimes and cyberattacks that pose a threat to the security of people and organisations and can lead to serious consequences. The study aims to examine how cyber technologies are formed and developed, as well as how they are used in the field of state defence in Ukraine and some European Union countries, namely Germany, France, the United Kingdom, and Indonesia. In the course of the study, were used structural-functional and dialectical methods, the method of synthesis,
APA, Harvard, Vancouver, ISO, and other styles
24

BROZIC, LILIANA. "INTERNATIONAL SECURITY COMMUNITY AT THE CROSSROADS." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2016/ ISSUE 18/2 (June 30, 2016): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.18.2.00.

Full text
Abstract:
For some time already, the international security community has been at a crossroads and looking for new right directions. The established operational guidelines have changed, and in some areas, it seems that they simply no longer exist. There are many factors which have had an effect on the relatively high level of security we have witnessed in the last few years. The financial crisis, which started to show its teeth in 2008 and 2009, has seriously changed the European armed forces, their structure, organization and development. Many comforted themselves that this does not constitute a signif
APA, Harvard, Vancouver, ISO, and other styles
25

Šepec, Miha, and Maša Kočivnik. "Combatting Cyberwarfare Crimes in the European Union." European Integration Studies 20, no. 2 (2024): 409–32. https://doi.org/10.46941/2024.2.16.

Full text
Abstract:
Cyberwarfare crimes constitute a major threat to the security of the European countries. The effects of such attacks could be devastating for the European economy, stability and national security. The question therefore remains, whether the European Union (EU) has effective security measures and strategies against cyberwarfare attacks, and whether it has appropriate legal definitions of such phenomena. Furthermore, does the EU have cooperation measures and institutions for combatting such crimes? In this article we will first present the practical and legal definition of cyberwarfare and its i
APA, Harvard, Vancouver, ISO, and other styles
26

Willems, Daan, Katharina Kohls, Bob van der Kamp, and Harald Vranken. "Data Exfiltration Detection on Network Metadata with Autoencoders." Electronics 12, no. 12 (2023): 2584. http://dx.doi.org/10.3390/electronics12122584.

Full text
Abstract:
We designed a Network Exfiltration Detection System (NEDS) to detect data exfiltration as occurring in ransomware attacks. The NEDS operates on aggregated metadata, which is more privacy-friendly and allows analysis of large volumes of high-speed network traffic. The NEDS aggregates metadata from multiple, sequential sessions between pairs of hosts in a network, which captures exfiltration by both stateful and stateless protocols. The aggregated metadata include averages per session of both packet count, request entropy, duration, and payload size, as well as the average time between sequentia
APA, Harvard, Vancouver, ISO, and other styles
27

Adebayo Adedoyin, Oluwakemi Farinde, Omotayo Ogunsola, Nonso Fred Chiobi, and Omolola Akinola. "Breach prevention strategies for cybersecurity in US SMEs and healthcare organizations description." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3068–95. https://doi.org/10.30574/wjarr.2025.26.2.0049.

Full text
Abstract:
Introduction: Small and medium-sized enterprises (SMEs) and healthcare organizations in the United States face significant cybersecurity challenges, with studies indicating that over 60% of SMEs have experienced a data breach in recent years. This study explores the critical strategies and best practices for preventing data breaches and enhancing cybersecurity resilience within these organizations. The digital transformation of business operations has exposed SMEs and healthcare organizations to a growing landscape of cybersecurity risks. These entities often lack the resources, expertise, and
APA, Harvard, Vancouver, ISO, and other styles
28

Szynkiewicz, Wojciech, Włodzimierz Kasprzak, Cezary Zieliński, et al. "Utilisation of Embodied Agents in the Design of Smart Human–Computer Interfaces—A Case Study in Cyberspace Event Visualisation Control." Electronics 9, no. 6 (2020): 976. http://dx.doi.org/10.3390/electronics9060976.

Full text
Abstract:
The goal of the research reported here was to investigate whether the design methodology utilising embodied agents can be applied to produce a multi-modal human–computer interface for cyberspace events visualisation control. This methodology requires that the designed system structure be defined in terms of cooperating agents having well-defined internal components exhibiting specified behaviours. System activities are defined in terms of finite state machines and behaviours parameterised by transition functions. In the investigated case the multi-modal interface is a component of the Operatio
APA, Harvard, Vancouver, ISO, and other styles
29

Brett, Mark, Joshua Wood, and Jamie Parker. "Cyber incident response approach framework for local government." Cyber Security: A Peer-Reviewed Journal, June 1, 2020. http://dx.doi.org/10.69554/jpep6952.

Full text
Abstract:
This paper provides an overview and executive summary of the Cyber Incident Response Framework (CIRF) and supporting materials; it is a ‘start here’ guide. The CIAF can be adapted to different types of organisation. It contains information on specific public sector/UK Government aspects relating to the Civil Contingencies Act and local resilience forums (LRF); again, these aspects can be adapted for organisations not covered by those legal and regulatory requirements.1 All UK organisations are covered by the National Cyber Security Centre (NCSC) remit; however, its intervention outside of the
APA, Harvard, Vancouver, ISO, and other styles
30

Brett, Mark. "A principles-led approach to information assurance and governance in local government." Cyber Security: A Peer-Reviewed Journal, June 1, 2022. http://dx.doi.org/10.69554/rnyg8837.

Full text
Abstract:
This practice-based paper explores a principles-led approach to cyber information governance for local authorities (LAs) in England and Wales, while linking it to a corporate information governance regime to support cyber security and resilience. Over the past 15 years the author has worked with several LA regional cyber security groups known as WARPs (Warning, Advice and Reporting Points). The paper goes on to propose an approach to cyber maturity, offering a novel way to think about the issues, while exploring a number of tools and techniques. This work has used a practice-based approach to
APA, Harvard, Vancouver, ISO, and other styles
31

"Malware Classification for Cyber Physical System (CPS) based on Phylogenetics." International Journal of Engineering and Advanced Technology 9, no. 1 (2019): 3666–70. http://dx.doi.org/10.35940/ijeat.a2711.109119.

Full text
Abstract:
Nowadays, the sectors most commonly targeted by malwares across the world are manufacturing, oil and gas, and education. Malwares such as BlackEnergy2 and Triton have the ability to cause severe, life-threatening damages to an organization and critical infrastructure systems such as oil and gas. Security researchers and practitioners are looking for efficient solutions to mitigate such malware attacks. Therefore, this paper presents a malware cyber physical system (CPS) classification to detect attacks. This classification is inspired by phylogenetics, borrowed from the biological area in term
APA, Harvard, Vancouver, ISO, and other styles
32

Piazza, Anna, Srinidhi Vasudevan, and Madeline Carr. "Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector." Journal of Cybersecurity 9, no. 1 (2023). http://dx.doi.org/10.1093/cybsec/tyad019.

Full text
Abstract:
Abstract Higher education has recently been identified as a sector of concern by the UK National Cyber Security Centre (NCSC). In 2021, the NCSC reported that universities and higher education institutions (HEI) had been exponentially targeted by cyber-criminals. Existing challenges were amplified or highlighted over the course of the global pandemic when universities struggled to continue to function through hybrid and remote teaching provision that relied heavily on their digital estate and services. Despite the value of the sector and the vulnerabilities within it, higher education has rece
APA, Harvard, Vancouver, ISO, and other styles
33

Chhabra Roy, Neha, and Sreeleakha Prabhakaran. "Internal-led cyber frauds in Indian banks: an effective machine learning–based defense system to fraud detection, prioritization and prevention." Aslib Journal of Information Management, August 12, 2022. http://dx.doi.org/10.1108/ajim-11-2021-0339.

Full text
Abstract:
PurposeThe study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.Design/methodology/approachThe methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking
APA, Harvard, Vancouver, ISO, and other styles
34

Kerigan-Kyrou, Dinos A. "Irish Defence Forces: An Cosantóir - Defining Our Approach to Cybersecurity . Kerigan-Kyrou D.A." February 1, 2018. https://doi.org/10.5281/zenodo.3593357.

Full text
Abstract:
<strong>Article Transcript:</strong> In January the media announced there may be critical vulnerabilities on computing devices across the world. Despite this bleak news there is, actually, much we can do to be proactive and lessen threats. Before addressing this, let&rsquo;s look at the background to this rapidly changing problem.Cybersecurity is an issue that blurs the boundary between what is considered &lsquo;military&rsquo; and &lsquo;non-military&rsquo;. This is a real test for NATO and its Partnership for Peace (PfP), of which Ireland is a key member. NATO has traditionally referred to c
APA, Harvard, Vancouver, ISO, and other styles
35

Makoshi, Stephen Mikah. "Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms By Stephen Mikah Makoshi May, 2025." May 14, 2025. https://doi.org/10.5281/zenodo.15412985.

Full text
Abstract:
<strong><em>Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms</em></strong> <strong>Author</strong>: Stephen Mikah Makoshi <strong>Publication Date</strong>: May 2025 <strong>Overview</strong> The manuscript <em>Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms</em>, authored by Stephen Mikah Makoshi, is a rigorous and timely exploration of the escalating domain of cyber warfare, focusing on sta
APA, Harvard, Vancouver, ISO, and other styles
36

"National Cyber Security Centre: Annual Review 2018." Network Security 2018, no. 11 (2018): 4. http://dx.doi.org/10.1016/s1353-4858(18)30108-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ibrahim, Azian, Noorfadhleen Mahmud, Nadrawina Isnin, Dina Hazelbella Dillah, and Dayang Nurfauziah Fauz Dillah. "Cyber Warfare Impact to National Security - Malaysia Experiences." KnE Social Sciences, August 18, 2019. http://dx.doi.org/10.18502/kss.v3i22.5052.

Full text
Abstract:
This study analyzed the cyber warfare impact on national security and focusing on Malaysia experiences. The issues regarding cyber warfare have become a serious concern since it was a risk of national security in Malaysia. The objectives of the study are to analyze issues related to cyber warfare that affected Malaysian system security, to determine causes that caused to cyber warfare. This study used a qualitative research approach to evaluate the current defense approaches related to cyber warfare in Malaysia. The interviews were conducted with the respective respondents: the Senior Manager,
APA, Harvard, Vancouver, ISO, and other styles
38

Brett, Mark. "An approach to establishing a multi-organisational public sector security operations centre." Cyber Security: A Peer-Reviewed Journal, July 1, 2023. http://dx.doi.org/10.69554/jdgl5623.

Full text
Abstract:
This paper presents a conceptual approach towards a public sector security operations centre capability at a regional level. This study supports the concept of the Government Cyber Coordination Centre as detailed in the UK Government Cyber Security Strategy December 2022, supporting the ‘Defend as One’ approach. The paper further proposes that the approach should work with nodes at a peer sub-regional and local level with information being aggregated at a regional or national level, with central oversight. This paper also considers some of the open-source tools available to support a security
APA, Harvard, Vancouver, ISO, and other styles
39

Joseph, Shawn. "Empowering boards: How the National Cyber Security Centre Board (United Kingdom) toolkit is transforming cyber security governance." Injury, June 2023, 110897. http://dx.doi.org/10.1016/j.injury.2023.110897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

"Leading The Fight Against Cybercrime." New Electronics 51, no. 7 (2018): 9. http://dx.doi.org/10.12968/s0047-9624(23)60012-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Tarka, Mitchell, Michael Blankstein, and Patrick Schottel. "Reply to: Empowering Boards: How the National Cyber Security Centre Board (United Kingdom) Toolkit is Transforming Cyber Security Governance." Injury, September 2023, 111013. http://dx.doi.org/10.1016/j.injury.2023.111013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Manjunath H R, Prashanth N M, Prathiksha L Shetty, Preethi M Rao, and Prenita Prinsal Saldanha. "A Review on Cyber Security." International Journal of Advanced Research in Science, Communication and Technology, August 27, 2022, 614–18. http://dx.doi.org/10.48175/ijarsct-7025.

Full text
Abstract:
Virtual simulation experiment teaching is an important content of higher education information construction and experimental teaching demonstration centre construction, and is the product of the deep integration of discipline and information technology. At present, traditional crimes in China are gradually shifting to the Internet, and cybercrimes are frequently and frequently occurring, seriously endangering national security, social order and people's interests. The forging of a team of high-quality professionals in network security and law enforcement is the inevitable path to effectively c
APA, Harvard, Vancouver, ISO, and other styles
43

Meshram, Bandu B., and Manish Kumar Singh. "Research Areas in Cyber Security and Forensic and Centre of Excellence for Forensic Laboratory." Journal of Web Applications and Cyber Security, June 25, 2023, 11–28. http://dx.doi.org/10.48001/jowacs.2023.1111-28.

Full text
Abstract:
This research work identifies the national and international related work to identify the cutting-edge areas of research problems in the domain of cloud computing , mobile software and multimedia data for its security and cyber forensics. The explanatory research identifies the statement of problems with its aim, objectives, and the scope of the work to be conducted into the proposed cyber forensic laboratory. The hardware and software requirements for the cybercrime digital forensic laboratory are identified to conduct cybercrime research in the domain of cyber security for the recommendation
APA, Harvard, Vancouver, ISO, and other styles
44

Doeland, Marco. "Collaboration and the sharing of information help reduce payment transactions fraud." Journal of Payments Strategy & Systems, March 1, 2017. http://dx.doi.org/10.69554/qecm6150.

Full text
Abstract:
In recent years, the Netherlands has benefited from the voluntary cooperation between various parties that play a role in the payment chain. For example, knowledge and experience in the field of fraud prevention and cyber security are shared and exchanged, more research and threat analyses are conducted, and fraud mitigation measures are coordinated and implemented jointly. This domestic partnership is unique in Europe. The Dutch Payments Association manages the collective aspects of cyber security policy in relation to the payment system, and works closely with other institutions, including t
APA, Harvard, Vancouver, ISO, and other styles
45

Ashraf, Nageen. "INDIA’S CYBER LANDSCAPE: AN ASSESSMENT OFINDIAN EFFORTS SINCE INDEPENDENCE." Journal of Contemporary Studies, February 28, 2024, 108–23. http://dx.doi.org/10.54690/jcr.2023(xii-ii).13772.

Full text
Abstract:
India, as the world's largest digitally connected democracy, recognizes the critical importance of cyberspace in the face of evolving technological dynamics. With the second-largest global internet base, India emphasizes self-sufficiency to bolster cyber resilience and reduce dependence on foreign technology. This research explores India's historical efforts, spanning from the post-independence era to contemporary times, aimed at fortifying its cyberspace. The study delves into domestic measures such as the New Electronics Policy (NEP), IT Act 2000, and the National Cyber Security Policy, comp
APA, Harvard, Vancouver, ISO, and other styles
46

Ashraf, Nageen. "INDIA'S CYBER LANDSCAPE: AN ASSESMENT OF INDIAN EFFORTS SINCE INDEPENDENCE." Journal of Contemporary Studies, February 28, 2024, 108–23. http://dx.doi.org/10.54690/jcs.v12i2.269.

Full text
Abstract:
India, as the world's largest digitally connected democracy, recognizes the critical importance of cyberspace in the face of evolving technological dynamics. With the second-largest global internet base, India emphasizes self-sufficiency to bolster cyber resilience and reduce dependence on foreign technology. This research explores India's historical efforts, spanning from the post-independence era to contemporary times, aimed at fortifying its cyberspace. The study delves into domestic measures such as the New Electronics Policy (NEP), IT Act 2000, and the National Cyber Security Policy, comp
APA, Harvard, Vancouver, ISO, and other styles
47

Sangster, Mark. "The three Ps of third-party risk." Cyber Security: A Peer-Reviewed Journal, June 1, 2020. http://dx.doi.org/10.69554/qpkr7301.

Full text
Abstract:
As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cyber security regulations continue to increase accountability around data confidentiality and protection, firms are struggling to shift from an in-house security paradigm to gain line of sight that extends to cover their vendors and the entire supply chain. Beyond the umbrella frameworks of NIST,1 ISO 27001 information and security management2 and ISO 27032 guidelines for cyber security,3 two smaller and —perhaps more palatable — guidelines offer simplified
APA, Harvard, Vancouver, ISO, and other styles
48

Cesarec, Ivana. "Beyond Physical Threats: Cyber-attacks on Critical Infrastructure as a Challenge of Changing Security Environment – Overview of Cyber-security legislation and implementation in SEE Countries." Annals of Disaster Risk Sciences 3, no. 1 (2020). http://dx.doi.org/10.51381/adrs.v3i1.45.

Full text
Abstract:
States, organizations and individuals are becoming targets of both individual and state-sponsored cyber-attacks, by those who recognize the impact of disrupting security systems and effect to people and governments. The energy sector is seen as one of the main targets of cyber-attacks against critical infrastructure, but transport, public sector services, telecommunications and critical (manufacturing) industries are also very vulnerable. One of most used example of cyber-attack is the Ukraine power grid attack in 2015 that left 230,000 people without power for up to 6 hours. Another most high
APA, Harvard, Vancouver, ISO, and other styles
49

Kerigan-Kyrou, Dinos A. "Irish Defence Forces - An Cosantóir. 'Cybersecurity & the Internet of Things - Transforming Our Approach to Defence'. Kerigan-Kyrou D.A." April 1, 2019. https://doi.org/10.5281/zenodo.3593880.

Full text
Abstract:
<strong>Article Transcript</strong> The Internet of Things (IoT) - the connection of devices across the internet - presents near limitless improvements for military equipment and defence capabilities. IoT collates data from weapons systems and platforms on land, sea, air, and from satellites, as well as directly from military personnel. For example, threats to Defence Forces, as well as threats to those we are protecting, can be more quickly and accurately identified with IoT enabled Intelligence, Surveillance, and Reconnaissance (ISR). Real-time medical information can be transmitted for rapi
APA, Harvard, Vancouver, ISO, and other styles
50

Kerigan-Kyrou, Dinos Anthony. "An Cosantóir, Irish Defence Forces, 'Defeating the Pandemic, Defending Our Critical Infrastructure, and Securing Cyberspace: Battles We Cannot Afford to Lose'." June 1, 2020. https://doi.org/10.5281/zenodo.5193564.

Full text
Abstract:
<strong>Article Transcript</strong> COVID-19 has resulted in serious illness and loss of life across Ireland and the rest of the world. Working closely with our healthcare professionals, the Defence Forces have a critical and central role in the response to the pandemic. Cyber security and the protection of our critical infrastructure may not appear as issues which are particularly relevant at this time. But they are crucial if we are to minimise economic harm, sustain recovery, and establish safe and effective infrastructure - including resilient medical infrastructure - for the long-term. Un
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!