38,457 research outputs found

    Active Cyber Defense in the Healthcare Sector

    Get PDF
    The healthcare industry is a vulnerable sector when it comes to cybercrime. To date, it continues to suffer the highest losses for twelve consecutive years (IBM, 2022). As care- providing systems depend more and more on technology, information assets become an appealing target for cyber criminals. Health data often contains sensitive and identifiable information such as full names, addresses, phone numbers, emails, Social Security Numbers, etc. All these falls under the term Personal Identifiable Information (PII) which are protected by many laws and acts with the purpose of protecting one’s privacy from harms such as identity theft and other fraudulent offenses. In addition to the privacy concern, there is also financial and reputational concerns involved. The health sector suffers frequents attacks and the number continues to grow every year. The purpose of this research thesis paper is to analyze the cyber defense technique Active Cyber Defense (ACD) in relation to the healthcare sector. It seeks to investigate the ways in which the health sector can benefit from incorporating ACD in its security strategy as well as analyzing the various security challenges that the health sector faces and how it attempts to address them. This research will be supported by research papers, government documents, reports, and articles

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Online Communities: Networks That Nurture Long-Distance Relationships and Local Ties

    Get PDF
    Presents findings from a survey conducted between January and February 2001. Examines two kinds of communities -- cyber-based communities, and those who use the Internet to connect with groups based in the community in which they live

    SPACE, CYBER, AND TELECOMMUNICATIONS LAW: 2019-2020 Annual Report

    Get PDF
    In assembling this Annual Report we appreciated the opportunity to review major accomplishments and growth of the Space, Cyber, and Telecommunications Law (SCTL) program during the 2019-2020 academic year. Of course, this was a year like no other as we responded to an unfolding global pandemic. We are proud of what we accomplished prior to that and of our response in the face of that sudden change. For readers unfamiliar with the program, the SCTL program was established in 2007 largely in response to interest by the U.S. Air Force in establishing a U.S. based program in space law to which it could send Judge Advocate General (JAG) officers. At the time it was established, the law school recognized the narrowness of the field and decided to focus the program more broadly on space law as the thencurrent domain of interest to the Department of Defense (DoD), on cyberlaw as the likely next domain of interest both to DoD and the nation generally, and on telecommunications as a common foundation necessary to both. We continue to focus on service to the state of Nebraska, taking on issues such as the rural digital divide and agricultural access to broadband, and our global community. We engage with international organizations and colleagues on challenges our society faces in space and online. The program faculty (and students) are active researchers, and the program organizes various events, including an annual conference in Washington, D.C. (one of the largest regular events focusing on space law), an annual conference in conjunction with USSTRATCOM (on DoD operational issues relating to space, cyber, and related issues), and an annual conference in Lincoln focusing on telecommunications and cyber issues as they impact the region. We appreciate continued support from the state of Nebraska, the University of Nebraska, our board members, and many of our friends and colleagues across the world

    Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

    Full text link
    Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available

    The Welfare State: The Challenges of Sustainability

    Get PDF
    It is nothing new that ‘the welfare state’ faces serious challenges. Ever since the 1970s, Western welfare states have by many researchers been regarded as being in crisis, but despite many policy adjustments and important variations among Western welfare states, the overall scope of the welfare state, as measured by social expenditure per capita, has by and large increased. At the same time, we can observe a globalization of social policy and the emergence of a more active social role of the state in many parts of the world during recent decades. But new challenges due to a variety of new security issues and new dimensions of uncertainty have appeared, not least following the unanticipated Russian large-scale invasion of and war on Ukraine and concomitant international political developments. Political unease about the future of the welfare state and scope of social policies in different parts of the world has escalated. Welfare political priorities must compete with increased priorities for defense, cyber security, and issues related to energy, climate, food, and the environment. Motivations for state responsibility for citizen welfare and well-being – as well as for the type and scope of responsibility - vary. The fate of the welfare state and social policies is clearly a question of political and normative commitment to what kind of socially active state is desired. The paper addresses the following topics: Why should a state be socially active? What were historical reasons for developing welfare states? What are current motivations for developing and maintaining welfare states? What are the economic, political, and moral dimensions of welfare state sustainability? In addition to possible national political responses to social challenges, it is argued that in a globalized world reinforced international cooperation, coordination and regulation may be necessary to achieve sustainability of (national) welfare states
    • …
    corecore