1,653 research outputs found
Understanding The Significance Of Cyber Security Threats
In the age of globalization, rapidly emerging digital infrastructures of states are open for the clandestine and malicious activities of virtual warriors. The dependency on cyberspace has revealed the digital vulnerabilities of states before their rivals. Hence, the national security of state, presently, is wrestling with the cyber security threats. The protection of core national values and sensitive infrastructure of states are under question. Therefore, the safety and security of digital assets of states have become one of the most serious concerns for the policymakers. The international cyber culture across has declared the national government of states more insecure and unprotected. The combination of offensive and defensive capabilities of state is the key instrument in the cyberspace for the security, and protection of their cyber borders. In this way, the central theme of the work attempts to highlight the significance of cyber security threats by elaborating the strategic dimension of global cyberspace
Implications of Cyber Security to Safety Approval in Railway
The railway domain has a justifiable preoccupation with safety, but less of a focus on cyber security. This could result in the risk of cyber security flaws in current railway systems being unacceptably high. However, in recent years the railway industry has realized the importance of cyber security, and the possible effects cyber security could have on safety functions, necessitating these aspects to also be considered as part of the safety approval. This trend can be seen from the fact that later updates of the railway standards from CENELEC to a larger degree include cyber security. This is also a consequence of the increasing digitalisation trend in the railway sector, as elsewhere in society (e.g., the ERTMS national implementation project in Norway). This paper presents findings from a brief literature study on how railway systems are vulnerable to cyber security threats and discusses how cyber security issues are covered by current railway legislation. Challenges related to the handling of cyber security threats as part of the railway approval processes is then elaborated. The fact that cyber security threats change faster than the pure safety threats must be taken into account. The problem is viewed from an independent safety assessor's point of view. Some major findings of the study are elaborated, and conclusions on how to deal with cyber security as part of the railway approval process are outlined with pros and cons.acceptedVersio
Implications of Cyber Security to Safety Approval in Railway
The railway domain has a justifiable preoccupation with safety, but less of a focus on cyber security. This could result in the risk of cyber security flaws in current railway systems being unacceptably high. However, in recent years the railway industry has realized the importance of cyber security, and the possible effects cyber security could have on safety functions, necessitating these aspects to also be considered as part of the safety approval. This trend can be seen from the fact that later updates of the railway standards from CENELEC to a larger degree include cyber security. This is also a consequence of the increasing digitalisation trend in the railway sector, as elsewhere in society (e.g., the ERTMS national implementation project in Norway). This paper presents findings from a brief literature study on how railway systems are vulnerable to cyber security threats and discusses how cyber security issues are covered by current railway legislation. Challenges related to the handling of cyber security threats as part of the railway approval processes is then elaborated. The fact that cyber security threats change faster than the pure safety threats must be taken into account. The problem is viewed from an independent safety assessor's point of view. Some major findings of the study are elaborated, and conclusions on how to deal with cyber security as part of the railway approval process are outlined with pros and cons.acceptedVersio
Cyber Security Professionals’ Challenges: A Proposed Integrated Platform Solution
As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide, cyber security professionals need to cope up with such a highly demanding environment. Security teams, such as Security operation Centre (SOC), Incident Response (IR) and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection to containment and preventing future incidents; which encompasses some significant challenges that might impose some limitations to the efficiency and effectiveness of activities cyber security professionals conduct, as these processes are time-consuming. In this paper we propose an integrated platform to help cyber security professionals to proactively manage cyber security threats and emerging incidents by providing an automated functionality that can optimize the workflow. The proposed security platform is supposed to diminish the average time taken by cyber security professionals to respond to cyber incidents with an average of 42%. This study can be used as a preliminary design for such an integrated platform
The importance of unifying physical security within the energy sector
Due to its unique position within critical infrastructure, the energy sector is very vulnerable. Cyber security threats targeting critical infrastructure are a growing concern as they can even threaten national security. There is an urgent need to define unified cybersecurity solutions for
the energy sector to keep it safe and reliable
Perspectives on Cyber Security for Offshore Oil and Gas Assets
In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operational technology) systems are evolving technologically, so are the cyber security threats faced by the offshore oil and gas assets. This paper aims to raise the awareness of cyber security threats and the organizational and technical measures that need to be adopted by the oil and gas industry for remote and complex assets in the upstream sector. A comprehensive literature review covering the areas of new IT/OT systems integration and cyber security risk analysis and management is presented. The results of a survey on the subject of cyber security for offshore oil and gas assets are also presented, and they provide valuable insight into the current industry culture and the perception of cyber security concepts. The importance of organizational culture, personnel training and involvement, as well as corporate engagement and support in the subject of cyber security is highlighte
Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security.
Masters Degree. University of KwaZulu-Natal, Durban.Modern shipping companies are reliant on the proliferation of refined technological
advancements such as Electric Chart Display and Information Systems (ECDIS), Automatic
Identification System (AIS), Global Maritime Distress and Safety System (GMDSS), Compass
(Gyro, fluxgate, GPS and others), Computerised Automatic Steering Systems, Voyage Data
Recorders – “Black box” (VDR), Radio Direction and Ranging or Automatic Radar Plotting
Aid (Radar/ARPA). These technological advancements are vulnerable to cyber security threats.
The prevalence of maritime cyber security incidents is increasing worldwide therefore it is
imperative for the maritime industry to have legal regime in place that adequately regulates
these cyber security threats.
This dissertation undertakes a critical analysis of the legal framework governing maritime
cyber security and the adequacy in combating maritime cyber threats. The first chapter will
provide an introduction and background to maritime cyber security. The second chapter
focuses on the different threats and vulnerabilities to maritime cyber security. In addition to
this reference will be made to the types of cybercrimes and their possible ramifications. The
third chapter will analyse the International regulatory regimes in place, regional regulatory
framework and South Africa’s domestic laws regulating maritime cyber security. In the fourth
Chapter a determination will be made as to the existence and adequacy of the law in combating
maritime cyber threats and crimes. A conclusion will be derived from the findings of this
dissertation, and recommendation will be submitted
The purpose of this study is to establish whether, (a) the existing law applies to maritime cyber
security threats at all, and, if so, what is the extent of the existing laws applicability to maritime
cyber security threats? (b) whether the domestic and international legal framework is adequate,
in respect to enforcement and comprehensiveness, to address/respond to maritime cyber
security threats? and (c) whether it is necessary to establish new regulations to address maritime
cyber security or develop existing laws?Dedication & Acknowledgement are in isiZulu
- …