76,833 research outputs found

    Cyber security situational awareness

    Get PDF

    The Criminalisation of Migration in Europe: A State-of-the-Art of the Academic Literature and Research. CEPS Liberty and Security in Europe No. 61, October 2013

    Get PDF
    In the last 30 years, a clear trend has come to define modern immigration law and policy. A set of seemingly disparate developments concerning the constant reinforcement of border controls, tightening of conditions of entry, expanding capacities for detention and deportation and the proliferation of criminal sanctions for migration offences, accompanied by an anxiety on the part of the press, public and political establishment regarding migrant criminality can now be seen to form a definitive shift in the European Union towards the so-called ‘criminalisation of migration’. This paper aims to provide an overview of the ‘state-of-the-art’ in the academic literature and EU research on criminalisation of migration in Europe. It analyses three key manifestations of the so-called ‘crimmigration’ trend: discursive criminalisation; the use of criminal law for migration management; and immigrant detention, focusing both on developments in domestic legislation of EU member states but also the increasing conflation of mobility, crime and security which has accompanied EU integration. By identifying the trends, synergies and gaps in the scholarly approaches dealing with the criminalisation of migration, the paper seeks to provide a framework for on-going research under Work Package 8 of the FIDUCIA project

    Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events

    Get PDF
    We live in a digital era where the global community relies on Information Systems to conduct all kinds of operations, including averting or responding to unanticipated risks and disasters. This can only happen when there is a robust information exchange facilitation mechanism in place, which can help in taking quick and legitimate steps in dealing with any kind of emergent situation. Prior literature in the field of information assurance has focused on building defense mechanisms to protect assets and reduce vulnerability to foreign attacks. Nevertheless, information assurance does not simply mean building an impermeable membrane and safeguarding information, but also implies letting information be securely shared, if required, among a set of related groups or organizations that serve a common purpose. This chapter will revolve around the central pivot of Information Sharing. Further, to study the relative significance of various information dimensions in different disaster situations, content analyses are conducted. The results hence obtained can be used to develop a prioritization framework for different disaster response activities, thus to increase the mitigation efficiency. We will also explore roles played by few existing organizations and technologies across the globe that are actively involved in Information Sharing to mitigate the impact of disasters and extreme events

    A Taxonomy-based Analysis of Attacks on Industrial Control Systems

    Get PDF
    Most critical infrastructure depends on industrial control and automation systems to manage their processes. However, industrial control and automation systems were found to have many vulnerabilities owing to their design. They were initially designed to operate as air-gapped systems. However, with the evolution and the expansion of the industry, they are increasingly being targeted by attackers. Thus, preventative methods must be implemented to minimize/ prevent ICSs from being compromised by patching the vulnerabilities and addressing possible attack vectors. In order to prepare to defend against forthcoming attacks on critical infrastructure, it is vital to understand how past attacks have been carried out. This study analyzed and cataloged cases of attacks against ICSs to form a taxonomy that can be used as a tool to analyze the nature of ICS attacks. The taxonomy developed by this study can aide interested parties to determine potential attack vectors an attacker may choose, based on the attributes discussed in the study. Moreover, this paper also serves as a resource for the interested parties to understand ICSs

    Comprehensive Security Framework for Global Threats Analysis

    Get PDF
    Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios

    Analysis on NSAW Reminder Based on Big Data Technology

    Get PDF
    NSAWS is an intelligent and real-time large database management system. By analyzing the user identity data and access rights contained in the collected information, the NSAWS finds out the potential risks and issues an alarm notice in a timely manner. This paper mainly studies how to strengthen the prevention of network attacks in BD environment from the following aspects. This paper first introduces the common technology on the Internet in our country and its application status; secondly, it expounds the architecture, deployment mode and operation mode of the large database system based on the basic security facilities such as cloud computing platform and firewall. Then the traditional NSAWS is analyzed and the simulation platform is tested. The results show that the platform has high accuracy and stability in alerting network security hazards and can effectively protect network security
    • 

    corecore