scholarly journals The Complexity of Cyber Attacks in a New Layered-Security Model and the Maximum-Weight, Rooted-Subtree Problem

Author(s):  
Geir Agnarsson ◽  
Raymond Greenlaw ◽  
Sanpawat Kantabutra
2021 ◽  
Vol 5 (3) ◽  
pp. 32
Author(s):  
Peter R.J. Trim ◽  
Yang-Im Lee

In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in real time. We deployed a qualitative research strategy that involved a group interview involving cyber security and intelligence experts. The coding approach was used to identify the themes in the data and, in addition, a number of categories and subcategories were identified. The mind map approach was utilized to identify the thought processes of senior managers in relation to ensuring that the cyber security management process is effective. The global cyber security model can be used by senior managers to establish a framework for dealing with a range of cyber security attacks, as well as to upgrade the cyber security skill and knowledge base of individuals. In order for a cyber security mentality to be established, senior managers need to ensure that staff are focused on organizational vulnerability and resilience, there is an open and transparent communication process in place, and staff are committed to sharing cyber security knowledge. By placing cyber security within the context of a partnership arrangement, senior managers can adopt a collectivist approach to cyber security and benefit from the knowledge of external experts.


2020 ◽  
Vol 5 (1) ◽  
pp. 26
Author(s):  
Aderonke F. Thompson ◽  
Oghenerukevwe E. Oyinloye ◽  
Matthew T. David ◽  
Boniface K. Alese

In the world of wireless communication, heterogeneous network topologies such as Wi-Fi and Long-Term Evolution (LTE) the topologies authentication service delivery forms a major challenge with access control; which is sought to be addressed. In this paper, we propose a security model by adapting Capability-based Context Aware Access Control (CCAAC) model for internet-enabled devices for defense against hacking or unauthorized access. The steps applied during the programming of this web application was followed through using the Elliptic-Curve Diffie–Hellman (ECCDH) algorithm so that the initiation of a random prime number between a range, the encryption and exchange of the devices public keys to the decryption are interpreted the right way to the machine making use of it. The results established a security model that has a good chance of being effective against present cyber-attacks other security loopholes.


Author(s):  
Ahmad Faiz Ghazali Et.al

This article aims to contribute in securing information technology (IT) systems and processes for information security by utilizing malware risk detection for decision-making processes to mitigate cyber-attacks. It has potential to be a real threat to the businesses and industrial applications. The risk management is an essential component where it can present a new information security model for supporting decision making. The current ideologies such as the anti-virus, malware and firewalls detection and protection are proving to be ineffective as they were not specifically designed for multi-tenant cloud environments. Therefore, this article presents a survey of malware risk detection techniques in cloud. The survey was conducted on publications from Scopus from the last 5 years. The findings indicate the current malware detection techniques are not enough to effectively detect and protect the cloud environments.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 87
Author(s):  
Sundresan Perumal ◽  
Sakinah Ali Pitchay ◽  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Pritheega Magalingam ◽  
...  

The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency’s interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies’ information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.  


2018 ◽  
Vol 12 (3) ◽  
pp. 123-140
Author(s):  
B S Kiruthika Devi ◽  
T. Subbulakshmi ◽  
KV Mahesh Babu

This article describes how nowadays, attackers are targeting valuable assets and infrastructures in networked systems causing an impact on enterprises and individuals. By implementing moving target defenses helps to prevent cyber-attacks by changing the attack surface. Some security models like Attack Graph (A.G) and Attack Tree (A.T) provide a formal method to access and compare the effectiveness of them. So, in this article, the authors incorporate moving target defenses in a security model, using a Hierarchical Attack Representation Model (HARM), to compare and access the effectiveness of the security. In addition, the authors are also taking important measures (IMs) for implementing MTD techniques to enhance the scalability of the network. Finally, they compare the scalability of an attack graph and HARM models by implementing MTD techniques to find the effectiveness of security in network.


2016 ◽  
Vol 22 (3) ◽  
pp. 591-612 ◽  
Author(s):  
Geir Agnarsson ◽  
Raymond Greenlaw ◽  
Sanpawat Kantabutra
Keyword(s):  

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document