1,653 research outputs found

    Understanding The Significance Of Cyber Security Threats

    Get PDF
    In the age of globalization, rapidly emerging digital infrastructures of states are open for the clandestine and malicious activities of virtual warriors. The dependency on cyberspace has revealed the digital vulnerabilities of states before their rivals. Hence, the national security of state, presently, is wrestling with the cyber security threats. The protection of core national values and sensitive infrastructure of states are under question. Therefore, the safety and security of digital assets of states have become one of the most serious concerns for the policymakers. The international cyber culture across has declared the national government of states more insecure and unprotected. The combination of offensive and defensive capabilities of state is the key instrument in the cyberspace for the security, and protection of their cyber borders. In this way, the central theme of the work attempts to highlight the significance of cyber security threats by elaborating the strategic dimension of global cyberspace

    Implications of Cyber Security to Safety Approval in Railway

    Get PDF
    The railway domain has a justifiable preoccupation with safety, but less of a focus on cyber security. This could result in the risk of cyber security flaws in current railway systems being unacceptably high. However, in recent years the railway industry has realized the importance of cyber security, and the possible effects cyber security could have on safety functions, necessitating these aspects to also be considered as part of the safety approval. This trend can be seen from the fact that later updates of the railway standards from CENELEC to a larger degree include cyber security. This is also a consequence of the increasing digitalisation trend in the railway sector, as elsewhere in society (e.g., the ERTMS national implementation project in Norway). This paper presents findings from a brief literature study on how railway systems are vulnerable to cyber security threats and discusses how cyber security issues are covered by current railway legislation. Challenges related to the handling of cyber security threats as part of the railway approval processes is then elaborated. The fact that cyber security threats change faster than the pure safety threats must be taken into account. The problem is viewed from an independent safety assessor's point of view. Some major findings of the study are elaborated, and conclusions on how to deal with cyber security as part of the railway approval process are outlined with pros and cons.acceptedVersio

    Implications of Cyber Security to Safety Approval in Railway

    Get PDF
    The railway domain has a justifiable preoccupation with safety, but less of a focus on cyber security. This could result in the risk of cyber security flaws in current railway systems being unacceptably high. However, in recent years the railway industry has realized the importance of cyber security, and the possible effects cyber security could have on safety functions, necessitating these aspects to also be considered as part of the safety approval. This trend can be seen from the fact that later updates of the railway standards from CENELEC to a larger degree include cyber security. This is also a consequence of the increasing digitalisation trend in the railway sector, as elsewhere in society (e.g., the ERTMS national implementation project in Norway). This paper presents findings from a brief literature study on how railway systems are vulnerable to cyber security threats and discusses how cyber security issues are covered by current railway legislation. Challenges related to the handling of cyber security threats as part of the railway approval processes is then elaborated. The fact that cyber security threats change faster than the pure safety threats must be taken into account. The problem is viewed from an independent safety assessor's point of view. Some major findings of the study are elaborated, and conclusions on how to deal with cyber security as part of the railway approval process are outlined with pros and cons.acceptedVersio

    Cyber Security Professionals’ Challenges: A Proposed Integrated Platform Solution

    Get PDF
    As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide, cyber security professionals need to cope up with such a highly demanding environment. Security teams, such as Security operation Centre (SOC), Incident Response (IR) and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection to containment and preventing future incidents; which encompasses some significant challenges that might impose some limitations to the efficiency and effectiveness of activities cyber security professionals conduct, as these processes are time-consuming. In this paper we propose an integrated platform to help cyber security professionals to proactively manage cyber security threats and emerging incidents by providing an automated functionality that can optimize the workflow. The proposed security platform is supposed to diminish the average time taken by cyber security professionals to respond to cyber incidents with an average of 42%. This study can be used as a preliminary design for such an integrated platform

    The importance of unifying physical security within the energy sector

    Get PDF
    Due to its unique position within critical infrastructure, the energy sector is very vulnerable. Cyber security threats targeting critical infrastructure are a growing concern as they can even threaten national security. There is an urgent need to define unified cybersecurity solutions for the energy sector to keep it safe and reliable

    Perspectives on Cyber Security for Offshore Oil and Gas Assets

    Get PDF
    In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operational technology) systems are evolving technologically, so are the cyber security threats faced by the offshore oil and gas assets. This paper aims to raise the awareness of cyber security threats and the organizational and technical measures that need to be adopted by the oil and gas industry for remote and complex assets in the upstream sector. A comprehensive literature review covering the areas of new IT/OT systems integration and cyber security risk analysis and management is presented. The results of a survey on the subject of cyber security for offshore oil and gas assets are also presented, and they provide valuable insight into the current industry culture and the perception of cyber security concepts. The importance of organizational culture, personnel training and involvement, as well as corporate engagement and support in the subject of cyber security is highlighte

    Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security.

    Get PDF
    Masters Degree. University of KwaZulu-Natal, Durban.Modern shipping companies are reliant on the proliferation of refined technological advancements such as Electric Chart Display and Information Systems (ECDIS), Automatic Identification System (AIS), Global Maritime Distress and Safety System (GMDSS), Compass (Gyro, fluxgate, GPS and others), Computerised Automatic Steering Systems, Voyage Data Recorders – “Black box” (VDR), Radio Direction and Ranging or Automatic Radar Plotting Aid (Radar/ARPA). These technological advancements are vulnerable to cyber security threats. The prevalence of maritime cyber security incidents is increasing worldwide therefore it is imperative for the maritime industry to have legal regime in place that adequately regulates these cyber security threats. This dissertation undertakes a critical analysis of the legal framework governing maritime cyber security and the adequacy in combating maritime cyber threats. The first chapter will provide an introduction and background to maritime cyber security. The second chapter focuses on the different threats and vulnerabilities to maritime cyber security. In addition to this reference will be made to the types of cybercrimes and their possible ramifications. The third chapter will analyse the International regulatory regimes in place, regional regulatory framework and South Africa’s domestic laws regulating maritime cyber security. In the fourth Chapter a determination will be made as to the existence and adequacy of the law in combating maritime cyber threats and crimes. A conclusion will be derived from the findings of this dissertation, and recommendation will be submitted The purpose of this study is to establish whether, (a) the existing law applies to maritime cyber security threats at all, and, if so, what is the extent of the existing laws applicability to maritime cyber security threats? (b) whether the domestic and international legal framework is adequate, in respect to enforcement and comprehensiveness, to address/respond to maritime cyber security threats? and (c) whether it is necessary to establish new regulations to address maritime cyber security or develop existing laws?Dedication & Acknowledgement are in isiZulu
    • …
    corecore