273 research outputs found

    Cyber Infrastructure Protection: Vol. III

    Get PDF
    Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.https://press.armywarcollege.edu/monographs/1412/thumbnail.jp

    A Quantitative Research Study on Probability Risk Assessments in Critical Infrastructure and Homeland Security

    Get PDF
    This dissertation encompassed quantitative research on probabilistic risk assessment (PRA) elements in homeland security and the impact on critical infrastructure and key resources. There are 16 crucial infrastructure sectors in homeland security that represent assets, system networks, virtual and physical environments, roads and bridges, transportation, and air travel. The design included the Bayes theorem, a process used in PRAs when determining potential or probable events, causes, outcomes, and risks. The goal is to mitigate the effects of domestic terrorism and natural and man-made disasters, respond to events related to critical infrastructure that can impact the United States, and help protect and secure natural gas pipelines and electrical grid systems. This study provides data from current risk assessment trends in PRAs that can be applied and designed in elements of homeland security and the criminal justice system to help protect critical infrastructures. The dissertation will highlight the aspects of the U.S. Department of Homeland Security National Infrastructure Protection Plan (NIPP). In addition, this framework was employed to examine the criminal justice triangle, explore crime problems and emergency preparedness solutions to protect critical infrastructures, and analyze data relevant to risk assessment procedures for each critical infrastructure identified. Finally, the study addressed the drivers and gaps in research related to protecting and securing natural gas pipelines and electrical grid systems

    Urban hydroinformatics: past, present and future

    Get PDF
    This is the author accepted manuscriptHydroinformatics, as an interdisciplinary domain that blurs boundaries between water science, data science and computer science, is constantly evolving and reinventing itself. At the heart of this evolution, lies a continuous process of critical (self) appraisal of the discipline’s past, present and potential for further evolution, that creates a positive feedback loop between legacy, reality and aspirations. The power of this process is attested by the successful story of hydroinformatics thus far, which has arguably been able to mobilize wide ranging research and development and get the water sector more in tune with the digital revolution of the past 30 years. In this context, this paper attempts to trace the evolution of the discipline, from its computational hydraulics origins to its present focus on the complete socio-technical system, by providing at the same time, a functional framework to improve the understanding and highlight the links between different strands of the state-of-art hydroinformatic research and innovation. Building on this state-of-art landscape, the paper then attempts to provide an overview of key developments that are coming up, on the discipline’s horizon, focusing on developments relevant to urban water management, while at the same time, highlighting important legal, ethical and technical challenges that need to be addressed to ensure that the brightest aspects of this potential future are realized. Despite obvious limitations imposed by a single paper’s ability to report on such a diverse and dynamic field, it is hoped that this work contributes to a better understanding of both the current state of hydroinformatics and to a shared vision on the most exciting prospects for the future evolution of the discipline and the water sector it serves

    Construction industry 4.0 and sustainability: an enabling framework

    Get PDF
    Governments worldwide are taking actions to address the construction sector's sustainability concerns, including high carbon emissions, health and safety risks, low productivity, and increasing costs. Applying Industry 4.0 technologies to construction (also referred to as Construction 4.0) could address some of these concerns. However, current understanding about this is quite limited, with previous work being largely fragmented and limited both in terms of technologies as well as their interrelationships with the triple bottom line of sustainability perspectives. The focus of this article is therefore on addressing these gaps by proposing a comprehensive multi-dimensional Construction 4.0 sustainability framework that identifies and categorizes the key Construction 4.0 technologies and their positive and negative impacts on environmental, economic, and social sustainability, and then establishing its applicability/usefulness through an empirical, multimethodology case study assessment of the UAE's construction sector. The findings indicate Construction 4.0’s positive impacts on environmental and economic sustainability that far outweigh its negative effects, although these impacts are comparable with regards to social sustainability. On Construction 4.0 technologies itself, their application was found to be nonuniform with greater application seen for building information modeling and automation vis-à-vis others such as cyber-physical systems and smart materials, with significant growth expected in the future for blockchain- and three-dimensional-printing-related technologies. The proposed novel framework could enable the development of policy interventions and support mechanisms to increase Construction 4.0 deployment while addressing its negative sustainability-related impacts. The framework also has the potential to be adapted and applied to other country and sectoral contexts

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies

    Digitalisation For Sustainable Infrastructure: The Road Ahead

    Get PDF
    In today’s tumultuous and fast-changing times, digitalisation and technology are game changers in a wide range of sectors and have a tremendous impact on infrastructure. Roads, railways, electricity grids, aviation, and maritime transport are deeply affected by the digital and technological transition, with gains in terms of competitiveness, cost-reduction, and safety. Digitalisation is also a key tool for fostering global commitment towards sustainability, but the race for digital infrastructure is also a geopolitical one. As the world’s largest economies are starting to adopt competitive strategies, a level playing field appears far from being agreed upon. Why are digitalisation and technology the core domains of global geopolitical competition? How are they changing the way infrastructure is built, operated, and maintained? To what extent will road, rail, air, and maritime transport change by virtue of digitalisation, artificial intelligence, and the Internet of Things? How to enhance cyber protection for critical infrastructure? What are the EU’s, US’ and China’s digital strategies?Publishe

    A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies

    Get PDF
    There is no doubting that contemporary technology creates new hazards, and these threats are many and significant, directly harming people's lives and threatening their stability. Because of the increased use of computers and Internet-connected cellphones in recent years, the problem of cybercrime has expanded substantially. Unquestionably, this kind of crime is now a reality that jeopardizes people's reputations and lives, therefore we must be aware of it to prevent being a victim. The exponential growth in internet connectedness is closely tied to a rise in cyberattack incidences, frequently with significant consequences. Malware is the weapon of choice for carrying out malicious intent in cyberspace, whether by exploiting pre-existing flaws or exploiting the unique properties of new technology. There is an urgent need in the cybersecurity area to develop more inventive and effective virus defense techniques. To do this, we first give an overview of the most often exploited vulnerabilities in the current hardware, software, and network layers. This follows criticism of the most recent mitigation efforts and the reasons why they may or may not be helpful. Following that, We'll talk about new attack methods for cutting-edge technologies including social networking, cloud computing, mobile technology, as well as critical infrastructure. We conclude by sharing our speculative findings on potential future research avenues

    A Fundamental Study on Research Challenges Associated with Social Network Analysis

    Get PDF
    Obtaining large scale data is one of the key challenges in studying social interaction. Understanding social interaction has been a great interest in various research field like sociology, economy, political science, marketing and so on. This paper studies the “need to know” basics about social media, social network and Social Network Analysis[SNA]. In this paper along with introducing some of the studies in this area, a categorization of research subareas was presented and a base has been provided for researchers to briefly get acquainted with some new, attractive and useful research areas. This information has never been available with such a huge volume, detail, and ease and speed of access before. A few number of social data analyst those who are interested in having this information or the results of analyzing it alongside their motivations are: commercial companies for advertising and promoting their products, sociologists for analyzing the behavior and features of different societies, intelligence organizations for preventing and detecting criminal activities, educational and cultural activists for promoting their goals, and employers for acquiring information about job seekers. This paper will sought after for the purpose of having precise knowledge for critically analyzing Social Networks, social media their analytics and their related challenges and opening areas

    Comprehensive U.S. Cyber Framework: Key Aspects of Critical Infrastructure, Private Sector, and Personally Identifiable Information

    Get PDF
    his project is a product of the Class of 2019 Bush School of Government and Public Service,Texas A&M University Capstone Program. The project lasted one academic year and involved eight second-year master students. It intends to synthesize and provide clarity in the realm of issues pertaining to U.S. Internet Protocol Space by demonstrating natural partnerships and recommendations for existing cyber incident response. The project was produced at the request of PointStream Inc., a private cybersecurity contractor. This capstone team analyzed existing frameworks for cyber incident response for PointStream, Inc. in order to propose a comprehensive and efficient plan for U.S. cybersecurity, critical infrastructure, and private sector stakeholders.Pointstream, Inc
    • …
    corecore