2,829 research outputs found
Security framework for industrial collaborative robotic cyber-physical systems
The paper introduces a security framework for the application of human-robot collaboration in a futuristic industrial cyber-physical system (CPS) context of industry 4.0. The basic elements and functional requirements of a secure collaborative robotic cyber-physical system are explained and then the cyber-attack modes are discussed in the context of collaborative CPS whereas a defense mechanism strategy is proposed for such a complex system. The cyber-attacks are categorized according to the extent on controllability and the possible effects on the performance and efficiency of such CPS. The paper also describes the severity and categorization of such cyber-attacks and the causal effect on the human worker safety during human-robot collaboration. Attacks in three dimensions of availability, authentication and confidentiality are proposed as the basis of a consolidated mitigation plan. We propose a security framework based on a two-pronged strategy where the impact of this methodology is demonstrated on a teleoperation benchmark (NeCS-Car). The mitigation strategy includes enhanced data security at important interconnected adaptor nodes and development of an intelligent module that employs a concept similar to system health monitoring and reconfiguration
Strengthening Personal Data Protection, Cyber Security, and Improving Public Awareness in Indonesia: Progressive Legal Perspective
The development of technology, communication, and the internet has positive and negative influences on all sectors of life in society. One of the negative impacts and problems is the alleged criminal act of buying and selling data and the absence of a special law (lex specialist) regarding the regulation of Indonesian personal data. The purpose of this research is to analyze in-depth the efforts to strengthen the protection of personal data, cyber security, and increase public awareness of the perspective of Progressive Law in Indonesia. This study uses a normative juridical method using secondary data, a statutory approach, a conceptual approach, and a case approach. This scientific paper concludes that the Synergy of Ministries and related institutions (Legislative, Executive, and Judiciary) is the key to protecting personal data and cyber resilience. Then, strengthening efforts should be made, namely immediately passing the Draft Law on Personal Data Protection (RUU PDP), forming an independent institution. However, if at this time a dispute occurs, it can be resolved by Article 30 of the ITE Law and the PMH Lawsuit (Tort), supported by a progressive legal approach and futuristic interpretation by the judge examining the quo case. The synergy of government agencies, the private sector, and other stakeholders is needed to increase public awareness by increasing education/dissemination of efforts to prevent misuse of personal data
Recommended from our members
Beyond state-centrism: international law and non-state actors in cyberspace
Classically, States and non-State actors were differentiated not only by disparities in legal status but also by significant imbalances in resources and capabilities. Not surprisingly, international law developed a State-centric bias to account for these imbalances. Cyberspace and cyber operations, however, have closed a number of formerly significant gaps between States’ and non-State actors’ abilities to compromise international peace and security. In fact, some non-State actors now match, if not exceed, the cyber capabilities of many States in this respect. Where public international law had long proved chiefly relevant to States’ interactions with other States, cyber operations by non-State actors increase the frequency with which public international law provides relevant and binding legal rules. This article surveys existing public international law for norms relevant to the cyber interactions of cyber-empowered States and non-State actors. Specifically, the article illustrates how the principles of sovereignty, State responsibility and the jus ad bellum are particularly relevant to States engaged in struggles with non-State actors for security and supremacy in cyberspace
A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena
AI Techniques for Combating Electronic Crimes and Enhancing Cybersecurity: Kuwaits Security Services as a Model
The research aimed to examine the security agencies use of artificial intelligence (AI) techniques in combating cybercrime and its reflection on enhancing cyber security. The study used the survey method in its descriptive and analytical levels. The interview tool was used to collect information from the research sample, the size of which was 12 items. The research found a set of results where the respondents declared the presence of an anti- cybercrime team comprised of specialists in police sciences, engineering, information systems, and network engineering. They added that using AI enables specialists in security agencies to benefit from its enormous potential in analyzing data, tracking cybercrime perpetrators through social networking sites, managing, and using information, following up on complaints, publications, and other messages, preparing security reports, and submitting them to the competent authorities, completing many general daily tasks and monitoring all the information that may affect the public opinion. The study recommended setting up industries related to AI technology to produce smart knowledge and unifying Arab capabilities in the information technology and communication field to protect Arab national security by combating foreign technical intrusions and virtual hegemony, representing the most advanced form of futuristic weapons
- …