32 research outputs found

    Four lines of compliance-protection of an industrial enterprise

    Get PDF
    In the process of improving the corporate governance system, the need to create a compliance unit is conditioned by the adoption of a corporate strategy. In particular, an effective compliance control service, including compliance risk assessment, is important to achieve the strategic goals and objectives of the corporation (for example, when acquiring or selling a business, the initial and subsequent placement of stocks and bonds in foreign capital markets, obtaining foreign loans, attracting foreign loans, attracting strategic foreign investors). Hence the increased interest on the part of practitioners to analyze the impact of compliance control functions on the implementation of corporate governance principles, as well as the identification of those subject areas of corporate management that require constant compliance support. The article proposes the creation of a compliance service on the basis of four lines of compliance protection. Recommendations are given on the conduct of each line of compliance protection. The concept of three lines of protection is analyzed in detail, the cell is widely known in banking. Recommendations on its adaptation to the conditions of industrial enterprise are developed. The concept of the fourth line of compliance protection was formed and recommendations for its practical use in industrial enterprises were given

    Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario

    Get PDF
    The detection and prevention of cyber-attacks is one of the main challenges in Vehicle-to-Everything (V2X) autonomous platooning scenarios. A key tool in this activity is the measurement report that is generated by User Equipment (UE), containing received signal strength and location information. Such data is effective in techniques to detect Rogue Base Stations (RBS) or Subscription Permanent Identifier SUPI/5G-GUTI catchers. An undetected RBS could result in unwanted consequences such as Denial of Service (DoS) attacks and subscriber privacy attacks on the network and UE. Motivated by this, this paper presents the novel simulation of a 5G cellular system to generate a realistic dataset of signal strength measurements that can later be used in the development of techniques to identify and prevent RBS interventions. The results show that the tool can create a large dataset of realistic measurement reports which can be used to develop and validate RBS detection techniques

    Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services

    Get PDF
    Large enterprises and organizations from both private and public sectors typically outsource a platform solution, as part of the Managed Security Services (MSSs), from 3rd party providers (MSSPs) to monitor and analyze their data containing cyber security information. Sharing such data among these large entities is believed to improve their effectiveness and efficiency at tackling cybercrimes, via improved analytics and insights. However, MSS platform customers currently are not able or not willing to share data among themselves because of multiple reasons, including privacy and confidentiality concerns, even when they are using the same MSS platform. Therefore any proposed mechanism or technique to address such a challenge need to ensure that sharing is achieved in a secure and controlled way. In this paper, we propose a new architecture and use case driven designs to enable confidential, flexible and collaborative data sharing among such organizations using the same MSS platform. MSS platform is a complex environment where different stakeholders, including authorized MSSP personnel and customers’ own users, have access to the same platform but with different types of rights and tasks. Hence we make every effort to improve the usability of the platform supporting sharing while keeping the existing rights and tasks intact. As an innovative and pioneering attempt to address the challenge of data sharing in the MSS platform, we hope to encourage further work to follow so that confidential and collaborative sharing eventually happens among MSS platform customers

    A cloud-edge based data security architecture for sharing and analyzing cyber threat information

    Get PDF
    Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only for cyber-security, but also for safety, as the cyber and physical worlds are increasingly linked. Providing effective cyber-security requires cooperation and collaboration among all the entities involved. Increasing the amount of cyber threat information (CTI) available for analysis allows better prediction, prevention and mitigation of cyber-attacks. However, organizations are deterred from sharing their CTI over concerns that sensitive and confidential information may be revealed to others. We address this concern by providing a flexible framework that allows the confidential sharing of CTI for analysis between collaborators. We propose a five-level trust model for a cloud-edge based data sharing infrastructure. The data owner can choose an appropriate trust level and CTI data sanitization approach, ranging from plain text, through anonymization/pseudonymization to homomorphic encryption, in order to manipulate the CTI data prior to sharing it for analysis. Furthermore, this sanitization can be performed by either an edge device or by the cloud service provider, depending upon the level of trust the organization has in the latter. We describe our trust model, our cloud-edge infrastructure, and its deployment model, which are designed to satisfy the broadest range of requirements for confidential CTI data sharing. Finally we briefly describe our implementation and the testing that has been carried out so far by four pilot projects that are validating our infrastructure

    Performance evaluation of GSM signaling protocols on USSD

    No full text

    Performance of WTLS and its impact on an M-commerce transaction

    No full text
    corecore