233 research outputs found

    Southeast Asia's Cyber Security Strategy: Multilateralism or Self-help

    Get PDF
    In terms of security research, cyber security is fundamentally a recent problem. When all facets of political, military, economic, social, and cultural life are connected to cyberspace, this problem occurs. Cyberterrorism, cybercrime, and cyberwar are all potential concerns in cyberspace. This threat cannot be separated from Southeast Asia, one of the main regions in the globe with a strong rate of economic expansion. This study aims to analyze the best approach for preserving cyber security in Southeast Asia. Neoliberalism and neorealism are common to mainstream methodologies scholars utilize to address the study subject. Simply put, ASEAN nations must advance their technology capacities while not underestimating the value of international cooperation

    IoT for Diabetics: Exploring IoT Adoption Issues

    Get PDF
    An increasing problem worldwide is the number of people living with and dying of critical, chronic diseases. One of these diseases is type 1 diabetes, which, as of today, is uncurable yet treatable through careful and precise monitoring. Using the Internet of Things (IoT) is one of the most efficient ways to monitor diabetes and is also said to improve the life-quality of people with diabetes. However, the great potential of IoT in diabetes treatment is followed by various challenged factors regarding privacy and security. Cyberattacks can affect not only the individual patient but everyone connected to the IT infrastructure of the hacked device. Existing reports show cyberattacks against the Norwegian healthcare sector have increased by 72% over the last year, resulting in about 450 attacks each week. Still, diabetic patients tend to trust their devices to be safe and are willing to take the risk as they consider their medical data as not interesting to cybercriminals. Healthcare personnel's lack of knowledge about information security and privacy best practice is reported to be an entry point for cybercriminals to gain access to critical IT systems. This study aimed to investigate the relationship between the potentially improved life-quality from using diabetes IoT and the challenges regarding privacy and cyberthreats, including the perspective of three different Norwegian stakeholder groups: diabetic patients (type 1), healthcare personnel working with diabetes patients, and industry representatives within healthcare and security. Findings suggest that neither patients nor healthcare personnel is concerned about patient privacy or threats against diabetes IoT, despite the increased cyberthreats in the healthcare sector. It further indicates a pressing matter for a discussion about data ownership generated by IoT and a revision of privacy regulations that make it easier for all Norwegian healthcare regions to interpret, comply, and act upon equally, to utilize the technology available and ensure diabetes patients all over the country have the same opportunities when it comes to patient care

    Incentivizing Low-level Organization Members By Increasing Their Behaviour Factors Is Crucial For An Innovative And Secure Up-to-date Workforce

    Get PDF
    In accordance with technological advancement and innovation in the contemporary digital business world, it has come to the Authors attention that technology focused protection and generally advancement is the “easy”, “temporary” and “fast” solution to growing digital security problems of modern data-gathering and data-processing organizations. In the Authors opinion, a socio-cultural change is needed as a foundation for these technological (technical) security measures. The said statement is gaining momentum in the scientific community, and therefore, the Author conducted a literature review as to further investigate. The problem primarily concerns the security culture of an organization which heavily relies on human factors, precisely the BEHAVIOUR factors. By taking in the human factor, combined with the knowledge factor and technical factor concerning data handling and defense against digital threats - this research tends to prove as to how, in the post COVID digital world, it is not enough for an organization to just implement technically, but it also needs to implement socio-culturally

    Cyber Security in Cyber Space

    Get PDF
    For almost twenty years, the Internet has been a driving force in global communication and an integral part of people\u27s everyday lives. As a result of technical developments and declining prices, over 3 billion people worldwide now utilize the Internet. The Internet has created a global infrastructure, and it is worth billions of dollars annually to the global economy (Judge et al.). Today\u27s economic, commercial, cultural, social, and governmental activities and exchanges occur in Cyberspace, involving individuals, enterprises, non-profit organizations, and government and governmental agencies (Aghajani and Ghadimi 220). Cyberspace is the birthplace of much of the world\u27s most essential and sensitive data, produced by transferring vital and sensitive information to it and developing fundamental and sensitive infrastructures and systems. (Akhavan-Hejazi and Mohsenian-Rad ). Also, most citizens spend time and energy interacting in this arena, which has become the focal point of media migration and financial transactions (Siniosoglou et al.) Most of a country\u27s material and spiritual resources are invested in Cyberspace, and most of an individual\u27s material and spiritual resources are either gained from or have a substantial influence on it (Amir and Givargis). That is to say, many facets of individuals\u27 lives depend on this area, and its instability, insecurity, and difficulties have an impact beyond its borders (Li et al.). For example, figure 1 shows the projected cost of cybercrimes worldwide as the negative impact of insecure Cyberspace. Nonetheless, governments face new security threats in the digital realm. Due to the low barrier to entrance, anonymity, the ambiguity of the unstable geographical region, the dramatic impact, and the lack of public transparency in Cyberspace, there are powerful and weak actors in Cyberspace, including governments, organized and terrorist organizations, and even individuals (Li and Qinghui). It distinguishes cyber risks from conventional national security concerns, which tend to be more obfuscated and whose actors can typically be traced back to certain governments and states in a specific region (Sarker). Analysts have speculated on the effects of cyber assaults for over a decade (Shin et al.). A virus\u27s purpose may be described as an attack on the financial papers of an economic system or a disruption of a country\u27s stock market. It is also possible for severe and potentially widespread physical or economic harm to arise from delivering an inaccurate message that causes a country\u27s power plant to halt and fail or interrupt the air traffic control system, which adds to air mishaps (Li and Qinghui)

    Waking Sleeping Beauty? Exploring the Challenges of Cyber-Deterrence by Punishment

    Get PDF

    ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing

    Get PDF
    The electrical grid has significantly evolved over the years, thus creating a smart paradigm, which is well known as the smart electrical grid. However, this evolution creates critical cybersecurity risks due to the vulnerable nature of the industrial systems and the involvement of new technologies. Therefore, in this paper, the ELECTRON architecture is presented as an integrated platform to detect, mitigate and prevent potential cyberthreats timely. ELECTRON combines both cybersecurity and energy defence mechanisms in a collaborative way. The key aspects of ELECTRON are (a) dynamic risk assessment, (b) asset certification, (c) federated intrusion detection and correlation, (d) Software Defined Networking (SDN) mitigation, (e) proactive islanding and (f) cybersecurity training and certification

    Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation

    Get PDF
    This paper discusses the rationale behind applying state-of-the-art graph databases as one of the innovative ways of enhancing the artificial intelligence-powered cybersecurity of e-commerce service. Firstly, the graph theory and graph databases are introduced. Then, the paper argues why graph databases are a good fit for cybersecurity experts’ tasks and what the advantages of applying graph databases in cybersecurity are. Then, a number of available, existing tools which combine the graph database technology and cybersecurity are shown. The main contribution of the paper is a real-life scenario which has been presented of a tool designed by the authors, which employs the graph database technology and e-commerce cybersecurity, with the conclusions given thereafter

    Cybersecurity: Risks, Progress, and the Way Forward in Latin America and the Caribbean

    Get PDF
    This report, prepared in collaboration with the Inter-American Development Bank (IDB) and the Global Cyber Security Capacity Centre of the University of Oxford, analyzes the cybersecurity capacity of OAS member states and encourages countries to implement the most up-to-date standards in cybersecurity, while protecting the fundamental rights of their people. As in the previous edition, the study analyzes the cyber maturity of each country in the five dimensions identified in the Cybersecurity Capacity Maturity Model for Nations (CMM): (i) Cybersecurity Policy and Strategy; (ii) Cyberculture and Society; (iii) Cybersecurity Education, Training, and Skills; (iv) Legal and Regulatory Frameworks; and (v) Standards, Organizations, and Technologies. The progress made in the region—much of it with the support of the OAS—is evident. The 2016 report, for example, indicated that four out of five countries lacked cybersecurity strategies or a critical infrastructure protection plan. By the beginning of 2020, 12 countries had approved national cybersecurity strategies, including Colombia (2011 and 2016), Panama (2013), Trinidad and Tobago (2013), Jamaica (2015), Paraguay (2017), Chile (2017), Costa Rica (2017), Mexico (2017), Guatemala (2018), Dominican Republic (2018), Argentina (2019), and Brazil (2020), with several others in progress. With regard to data collection and validation carried out by our member states, the report represents an overview of the complex and changing universe of cyberspace. We hope that this study provides a perspective that allows us to appreciate where we are, that enables us to make decisions based on evidence, and that improves our collective understanding of the challenges and opportunities implied by cybersecurity in our region. The information and analysis in this report will help all stakeholders—governments, private sector, academia, and civil society—to work to build a safer, more resilient, and productive cyberspace in our hemisphere

    Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

    Get PDF
    Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI\u27s potential in improving cybersecurity solutions, by identifying both its strengths and weaknesses. We also discuss future research opportunities associated with the development of AI techniques in the cybersecurity field across a range of application domains
    • …
    corecore