Cyber Security in the Nuclear and Radiological Domain: Case Study of Republic of Moldova

Author(s):  
A. A. Buzdugan ◽  
A. I. Buzdugan
Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


Author(s):  
Ana Jeleapov ◽  

The paper contains the results of classification of rivers and streams of the Republic of Moldova according to classic Strahler method. Mentioned method was applied to estimate the hierarchical rank of the stream segments situated in 50 pilot basins using modern GIS techniques and drainage network of the GIS for Water Resources of Moldova. It was estimated that the maximal order of segments is 7 specific for the Raut and Ialpug rivers. Overall, length of 1st order streams forms 50%, while that of 7th order streams - < 1%. Additionally, stream number and frequency as well as drainage density were calculated for pilot river basins.


2018 ◽  
pp. 1060-1092
Author(s):  
Hanaa. M. Said ◽  
Rania El Gohary ◽  
Mohamed Hamdy ◽  
Abdelbadeeh M. Salem

Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining methods specifically represented as decision tress model, Logistic regression, association rules model, Bayesian network for making reference measurements, to measure the extent of securing the data, and the provided services. The authors discuss various types of cyber-attacks describing how data mining helps in detection and prevention of these attacks. A comparative analysis between a set of selected frameworks is presented. Finally this chapter imparts numbers of applications for the data mining Methodologies in Cyber Security. Results applied on the site of the authority for cleaning and beautifying Cairo governorate in Egypt.


Author(s):  
Kwasi Danso Dankwa

The use of computers and sophisticated technologies are on the rise, and organizations are constantly looking for ways to invest in technologies to stay ahead of the competitive market. As such, cyber security and safety measures have been put in place by the organizations to protect them from attacks and to ensure that products and services are safe. However, managing cyber security and safety is becoming more challenging in today's business because people are both a cause of cyber security incidents as well as a key part of the protection from them. It is however that non-compliance with policies and directives are major security breaches. What is not well known, however, are the reasons behind the non-compliance behaviours. This chapter seeks to explore the reasons behind the non-compliance behaviours by use of compliance assessment model (CAM). The chapter reviews a case study in a health centre and systematically assesses the reasons behind the non-compliance behaviour by using the CAM model.


2020 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Jeffrey Kurebwa ◽  
Eunice Magumise

This study investigated the effectiveness of Zimbabwe's cyber security frameworks in combating terrorism. Media reports and scholarly evidence have constantly shown that cybercrime has led to loss of life, money, security, damage to property. There is a lot of concern among citizens of African countries such as Zimbabwe, Kenya, and Nigeria that their governments are not equipped with effective cyber security systems to combat these cyber threats. It is on the basis of these concerns that this study was carried out with the hope of helping to close policy and knowledge gaps affecting the effectiveness of the cyber security frameworks of Zimbabwe. The study used qualitative methodology and a case study research design was utilised. The study was conducted in Harare the capital city of Zimbabwe. Key informant interviews and documentary search were used to collect data. Among the findings of the study were that cyber fraud and theft are some of the significant cyber security threats in Zimbabwe; that Zimbabwe lacks established legislation and other regulatory institutions for cyber-security. Among the recommendations are; that the Ministry of Justice, Legal and Parliamentary Affairs enacts cyber security laws in Zimbabwe to combat cyber terrorism.


2019 ◽  
Vol 11 (5) ◽  
pp. 837-862 ◽  
Author(s):  
Diamantino Torres ◽  
Carina Pimentel ◽  
Susana Duarte

Purpose The purpose of this study intends to make a characterization of a shop floor management (SFM) system in the context of smart manufacturing, through smart technologies and digital shop floor (DSF) features. Design/methodology/approach To attain the paper objective, a mixed method methodology was used. In the first stage, a theoretical background was carried out, to provide a comprehensive understanding on SFM system in a smart manufacturing perspective. Next, a case study within a survey was developed. The case study was introduced to characterize a SFM system, while the survey was made to understand the level of influence of smart manufacturing technologies and of DSF features on SFM. In total, 17 experts responded to the survey. Findings Data analytics is the smart manufacturing technology that influences more the SFM system and its components and the cyber security technology does not influence it at all. The problem solving (PS) is the SFM component more influenced by the smart manufacturing technologies. Also, the use of real-time digital visualization tools is considered the most influential DSF feature for the SFM components and the data security protocols is the least influential one. The four SFM components more influenced by the DSF features are key performance indicator tracking, PS, work standardization and continuous improvement. Research limitations/implications The study was applied in one multinational company from the automotive sector. Originality/value To the best of the authors’ knowledge, this work is one of the first to try to characterize the SFM system on smart manufacturing considering smart technologies and DSF features.


2020 ◽  
Vol 62 (7) ◽  
pp. 2917-2935
Author(s):  
Alaa Mohasseb ◽  
Benjamin Aziz ◽  
Jeyong Jung ◽  
Julak Lee

Sign in / Sign up

Export Citation Format

Share Document