7 research outputs found

    Deteksi, Monitoring Dan Pencegahan Insider Threat : As A Survey

    Get PDF
    Abstract - many organizations using networks such as the Internet in data management. With a network of course the threat continues to threaten the confidentiality, integrity and availability of the system. Many organizations do this prevention, but they usually focus on the threat from the outside. The threat from within is more easily abuse the access authority often escape the focus of prevention. Has been a lot of research that explores the problems of insider threat. The approach taken out of the habit theory proposed by Moyano, Bayesian Network models and preliminary model of the End User Computing (EUC). This paper defines the threat from within (Insider Threat) with techniques of detection and prevention, and then do the mapping for the management of the system against the insider threat. Keywords: insider threats, detection, monitoring, sociology, management system Abstrak – Organisasi banyak menggunakan jaringan seperti internet dalam pengelolaan data. Dengan jaringan tentu saja ancaman senantiasa mengancam confidentiality, integrity dan availability system. Banyak organisasi melakukan pencegahan ini, namun biasanya fokus mereka pada ancaman dari luar. Adapun ancaman dari dalam yang lebih mudah menyalahgunakan otoritas akses sering luput dari fokus pencegahannya. Telah banyak penelitian yang mengetengahkan permasalahan insider threat. Pendekatan diambil dari teori kebiasaan yang diajukan oleh Moyano, model Bayesian Network dan model preliminary pada End User Computing (EUC). Tulisan ini mendefinisikan ancaman dari dalam (Insider threat) dengan teknik-teknik pendeteksian dan pencegahannya dan kemudian melakukan pemetaan untuk pengelolaan manajemen sistem terhadap insider threat. Kata kunci: insider threat, detection, monitoring, sociology, system managemen

    Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry

    Get PDF
    The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the Midlands area of South Carolina who recruited skilled cybersecurity professionals to support long-term business sustainability. Coding, clustering, and theme development evolved through coding key words and actions, drawing ideas together into clusters, and evolving the prominent ideas into themes. During data analysis, the theoretical propositions underwent a sequential process, which included coding the data by hand. The use of member checking and methodological triangulation increased the trustworthiness of the study. Analysis revealed 3 themes: increased training, broadened social networking, and improved communication. Financial service leaders can use training to educate and recruit new cybersecurity professionals. Also, findings suggest the need for training to improve social networking and communicate as a team to increase profitability. The findings from this study may contribute to social change by helping business owners recruit skilled professionals to prevent or reduce cybersecurity threats

    Space Systems: Emerging Technologies and Operations

    Get PDF
    SPACE SYSTEMS: EMERGING TECHNOLOGIES AND OPERATIONS is our seventh textbook in a series covering the world of UASs / CUAS/ UUVs. Other textbooks in our series are Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA\u27s Advanced Air Assets, 1st edition. Our previous six titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols et al., 2021) (Nichols R. K. et al., 2020) (Nichols R. et al., 2020) (Nichols R. et al., 2019) (Nichols R. K., 2018) Our seventh title takes on a new purview of Space. Let\u27s think of Space as divided into four regions. These are Planets, solar systems, the great dark void (which fall into the purview of astronomers and astrophysics), and the Dreamer Region. The earth, from a measurement standpoint, is the baseline of Space. It is the purview of geographers, engineers, scientists, politicians, and romantics. Flying high above the earth are Satellites. Military and commercial organizations govern their purview. The lowest altitude at which air resistance is low enough to permit a single complete, unpowered orbit is approximately 80 miles (125 km) above the earth\u27s surface. Normal Low Earth Orbit (LEO) satellite launches range between 99 miles (160 km) to 155 miles (250 km). Satellites in higher orbits experience less drag and can remain in Space longer in service. Geosynchronous orbit is around 22,000 miles (35,000 km). However, orbits can be even higher. UASs (Drones) have a maximum altitude of about 33,000 ft (10 km) because rotating rotors become physically limiting. (Nichols R. et al., 2019) Recreational drones fly at or below 400 ft in controlled airspace (Class B, C, D, E) and are permitted with prior authorization by using a LAANC or DroneZone. Recreational drones are permitted to fly at or below 400 ft in Class G (uncontrolled) airspace. (FAA, 2022) However, between 400 ft and 33,000 ft is in the purview of DREAMERS. In the DREAMERS region, Space has its most interesting technological emergence. We see emerging technologies and operations that may have profound effects on humanity. This is the mission our book addresses. We look at the Dreamer Region from three perspectives:1) a Military view where intelligence, jamming, spoofing, advanced materials, and hypersonics are in play; 2) the Operational Dreamer Region; whichincludes Space-based platform vulnerabilities, trash, disaster recovery management, A.I., manufacturing, and extended reality; and 3) the Humanitarian Use of Space technologies; which includes precision agriculture wildlife tracking, fire risk zone identification, and improving the global food supply and cattle management. Here’s our book’s breakdown: SECTION 1 C4ISR and Emerging Space Technologies. C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. Four chapters address the military: Current State of Space Operations; Satellite Killers and Hypersonic Drones; Space Electronic Warfare, Jamming, Spoofing, and ECD; and the challenges of Manufacturing in Space. SECTION 2: Space Challenges and Operations covers in five chapters a wide purview of challenges that result from operations in Space, such as Exploration of Key Infrastructure Vulnerabilities from Space-Based Platforms; Trash Collection and Tracking in Space; Leveraging Space for Disaster Risk Reduction and Management; Bio-threats to Agriculture and Solutions From Space; and rounding out the lineup is a chapter on Modelling, Simulation, and Extended Reality. SECTION 3: Humanitarian Use of Space Technologies is our DREAMERS section. It introduces effective use of Drones and Precision Agriculture; and Civilian Use of Space for Environmental, Wildlife Tracking, and Fire Risk Zone Identification. SECTION 3 is our Hope for Humanity and Positive Global Change. Just think if the technologies we discuss, when put into responsible hands, could increase food production by 1-2%. How many more millions of families could have food on their tables? State-of-the-Art research by a team of fifteen SMEs is incorporated into our book. We trust you will enjoy reading it as much as we have in its writing. There is hope for the future.https://newprairiepress.org/ebooks/1047/thumbnail.jp

    The Apocalypse Syndrome

    Get PDF

    Digital Rhetoric: Theory, Method, Practice

    Get PDF
    A survey of a range of disciplines whose practitioners are venturing into the new field of digital rhetoric, examining the history of the ways digital and networked technologies inhabit and shape traditional rhetorical practices as well as considering new rhetorics made possible by current technologie

    The impact of migration on urban security and the quality of urban life

    Get PDF
    The paper analyzes the impact of migration on urbanization, that is, on urban security in major cities and the quality of urban life. Urbanization itself has its own positive and negative challenges. The positive challenges are most often associated with accelerated modernization of cities and their industrialization, economic development, democratization, im�proved quality of services, cultural development, education, etc. According to some unwritten rule, the quality of services in urban areas increases in proportion to the increase in the popula�tion. On the other hand, the large concentration of population in a small area highlights the dis�advantages that are a side segment of the urbanization and are most often related to security, i.e. to the so-called “urban security”. The shortfalls are associated with the increased occurrence of negative social deviations, poverty, increased crime rate, lack of drinking water, enormous soil, water and air pollution, concentration of large populations in a small area, vulnerability to terrorism, increased noise, scarce green areas, appearance of a specific microclimate, climate change, etc. This also leads to a division of the population living in neighborhoods, which are most often formed based on the economic power of the population and security. There are also poor neighborhoods that may be hotbeds of negative social deviations and are characterized by a lack of security of the population. This, in turn, requires the city authorities and the state to invest additional resources in finding mechanisms that will remove such shortfalls and allow the population greater equity and security. Urbanization is widely accepted by a large proportion of the population, but there is also strong resistance in part of the population that opposes modernization and urbanization and is attached to the traditional way of life in the rural areas. The paper aims to emphasize some of the benefits, but also some of the challenges that are a segment of the urbanization, that is, the migration of the population and urban security and the quality of life of the population

    Digital Theatre: A "Live" and Mediated Art Form Expanding Perceptions of Body, Place, and Community

    Get PDF
    This work discusses Digital Theatre, a type of performance which utilizes both "live" actors and co-present audiences along with digital media to create a hybrid art form revitalizing theatre for contemporary audiences. This work surveys a wide range of digital performances (with "live" and digital elements, limited interactivity/participation and spoken words) and identifies the group collectively as Digital Theatre, an art form with the flexibility and reach of digital data and the sense of community found in "live" theatre. I offer performance examples from Mark Reaney, David Saltz, Troika Ranch, Gertrude Stein Repertory Theatre, Flying Karamazov Brothers, Talking Birds, Yacov Sharir, Studio Z, George Coates Performance Group, and ArtGrid. (The technologies utilized in performances include: video-conferencing, media projection, MIDI control, motion capture, VR animation, and AI). Rather than looking at these productions as isolated events, I identify them as a movement and link the use of digital techniques to continuing theatrical tradition of utilizing new technologies on the stage. The work ties many of the aesthetic choices explored in theatrical past by the likes of Piscator, Svoboda, Craig, and in Bauhaus and Futurist movements. While it retains the essential qualities of public human connection and imaginative thought central to theatre, Digital Theatre can cause theatrical roles to merge as it extends the performer's body, expands our concept of place, and creates new models of global community
    corecore