68,452 research outputs found

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    Food security, risk management and climate change

    Get PDF
    This report identifies major constraints to the adaptive capacity of food organisations operating in Australia. This report is about food security, climate change and risk management. Australia has enjoyed an unprecedented level of food security for more than half a century, but there are new uncertainties emerging and it would be unrealistic – if not complacent – to assume the same level of food security will persist simply because of recent history. The project collected data from more than 36 case study organisations (both foreign and local) operating in the Australian food-supply chain, and found that for many businesses,  risk management practices require substantial improvement to cope with and exploit the uncertainties that lie ahead. Three risks were identified as major constraints to adaptive capacity of food organisations operating in Australia:  risk management practices; an uncertain regulatory environment – itself a result of gaps in risk management; climate change uncertainty and projections about climate change impacts, also related to risk management

    CoESS’ Facts and Figures 2013

    Get PDF

    An exploratory study in to the money laundering threats, vulnerabilities, and controls within the UK bookmaker sector, with a specific focus on Fixed-Odds Betting Terminals

    Full text link
    The purpose of this exploratory study was to generate an understanding in to the money laundering threats, vulnerabilities and controls found within UK betting shops, with a direct focus on the exponential growth of Fixed-Odd Betting Terminals. Qualitative research methods facilitated eight semi-structured interviews with key stakeholders linked to the gambling and/or money laundering sphere. This included the Gambling Commission, Campaign for Fairer Gambling, an ex-Head of Security and Safety at a major bookmaker, and five regular Fixed-Odd Betting Terminal users. The interviews were recorded, transcribed and coded for thematic analysis, subsequently resulting in the emergence of four interesting and meaningful themes. These were (1) Ineffective CDD enforcement facilitating anonymity (2) Weak anti-money laundering safeguards unable to mitigate known threats (3) A lack of anti-money laundering training, awareness, and resources (4) The Gambling Commission’s attempt for increased anti-money laundering regulation unsuccessful. By allowing a phenomenological framework to guide the data collection process, the interpreted subjective views and experiences of the participants involved, although somewhat limited, indicate that money laundering threats within the bookmaker sector are inherently high, with a lack of effective safeguards in place to mitigate the identified vulnerabilities

    Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementIn this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros loss from such incidents; even the data loss and operational hazard may have a devastating impact not only on the service, security, privacy, brand image but also upon overall business. A constrictive and realistic CSCD (cyber security and cyber defense) strategy along with the proper implementation of it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare an improved CSCD control framework based on several hundreds of scientific papers and frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD control risk assessment and data analysis for preparing CSCD strategy and planning of different levels of organizations to maintain effective CSCD governance and cyber resilience

    CYBERSECURITY IN THE HEALTHCARE ENVIRONMENT

    Get PDF
    Abstract In 1990 the online world began to take shape when Tim Berners-Lee invented the World Wide Web. Almost simultaneously, cybersecurity was birthed to protect and minimize the various threats including but not limited to worms, viruses, and data breaches. Cybersecurity includes the various technologies, equipment both hardware and software, processes, and procedures that are used to guard against unauthorized attacks or access to protected information. This paper will focus on cybersecurity as it relates to the healthcare environment. Every department in a healthcare facility is responsible for taking care of patients. This should be their number one priority and information technology is no exception. While IT staff most likely do not provide hands on care to patients, they go to great lengths to protect their personal health information. In a healthcare environment, there are numerous departments such as Lab, Radiology, and Pharmacy etc. that need to have integrated systems. These systems must also be able to reach the internet and often be accessible to outside/non-employed vendors for support and maintenance. Also, communication among employees and with the outside world is a must. Email, video conferencing, desktop sharing, and faxing are all used thousands of times a day. It is imperative that cybersecurity be a top priority and everyone holds himself or herself responsible for protecting the systems that allow staff to take care of their patients
    • 

    corecore