3,457 research outputs found

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    Get PDF
    Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach

    A Survey on Energy Efficiency in Smart Homes and Smart Grids

    Get PDF
    Empowered by the emergence of novel information and communication technologies (ICTs) such as sensors and high-performance digital communication systems, Europe has adapted its electricity distribution network into a modern infrastructure known as a smart grid (SG). The benefits of this new infrastructure include precise and real-time capacity for measuring and monitoring the different energy-relevant parameters on the various points of the grid and for the remote operation and optimization of distribution. Furthermore, a new user profile is derived from this novel infrastructure, known as a prosumer (a user that can produce and consume energy to/from the grid), who can benefit from the features derived from applying advanced analytics and semantic technologies in the rich amount of big data generated by the different subsystems. However, this novel, highly interconnected infrastructure also presents some significant drawbacks, like those related to information security (IS). We provide a systematic literature survey of the ICT-empowered environments that comprise SGs and homes, and the application of modern artificial intelligence (AI) related technologies with sensor fusion systems and actuators, ensuring energy efficiency in such systems. Furthermore, we outline the current challenges and outlook for this field. These address new developments on microgrids, and data-driven energy efficiency that leads to better knowledge representation and decision-making for smart homes and SGsThis research was co-funded by Interreg Österreich-Bayern 2014–2020 programme project KI-Net: Bausteine fĂŒr KI-basierte Optimierungen in der industriellen Fertigung (AB 292). This work is also supported by the ITEA3 OPTIMUM project and ITEA3 SCRATCH project, all of them funded by the Centro TecnolĂłgico de Desarrollo Industrial (CDTI), Spain

    AI Techniques for Combating Electronic Crimes and Enhancing Cybersecurity: Kuwaits Security Services as a Model

    Get PDF
    The research aimed to examine the security agencies use of artificial intelligence (AI) techniques in combating cybercrime and its reflection on enhancing cyber security. The study used the survey method in its descriptive and analytical levels. The interview tool was used to collect information from the research sample, the size of which was 12 items. The research found a set of results where the respondents declared the presence of an anti- cybercrime team comprised of specialists in police sciences, engineering, information systems, and network engineering. They added that using AI enables specialists in security agencies to benefit from its enormous potential in analyzing data, tracking cybercrime perpetrators through social networking sites, managing, and using information, following up on complaints, publications, and other messages, preparing security reports, and submitting them to the competent authorities, completing many general daily tasks and monitoring all the information that may affect the public opinion. The study recommended setting up industries related to AI technology to produce smart knowledge and unifying Arab capabilities in the information technology and communication field to protect Arab national security by combating foreign technical intrusions and virtual hegemony, representing the most advanced form of futuristic weapons
    • 

    corecore