Toward a Vulnerability Mitigation Model

2021 ◽  
pp. 141-160
Author(s):  
José Eduardo Malta de Sá Brandão

This chapter demonstrates how the elements of a cybersecurity incident can be analysed systematically, and suggests an alternative way to mitigate the causes and consequences of such incidents. Cybersecurity incidents can be explained in terms of a sequence of elements linking the attacking agents to their objectives: the attacking agent uses tools to exploit vulnerabilities, causing actions on a specific target to obtain unauthorized results, achieving their objectives. Cyber security can be improved by stopping the flow of the attack by mitigating one or more elements that make up the process. Unfortunately, most of these elements have characteristics that limit the opportunities for mitigation. The least difficult element to mitigate is vulnerability. The current model of vulnerability mitigation has behaved for the corporate environment, which can pay for specialized tools and consulting. This is an excellent business model but inaccessible to the public. A new model is necessary to prevent cybersecurity incidents on a broader, more inclusive level. The main proposal for vulnerability mitigation is multisector cooperation to create an independent, trustworthy, and secure vulnerability database, based on a new vulnerability report protocol developed in accordance with researchers, companies, governments, and society. However, this proposal creates some social, political, and technical challenges.

2012 ◽  
Vol 18 (2) ◽  
pp. 6
Author(s):  
Johan Lidberg ◽  
David Robie

Since the call for papers to the theme for this issue of the Pacific Journalism Review, more tumultuous events in journalism have unfolded dominated by the agonising restructure of the newspaper arms of media companies across the region. Hundreds of editorial jobs are on the line. The increasingly desperate search for the ‘new business model’ has been stepped up. But is the new model the only answer to the current plight of journalism? Are media proprietors paying enough attention to the fact that the business model is built on the public trusting the journalistic practices that sit at the heart of the media brands? Perhaps all stakeholders should pay closer attention to Conboy’s thoughts?


Author(s):  
Christina Joy Ditmore ◽  
Angela K. Miller

Mobility as a Service (MaaS) is the concept through which travelers plan, book, and pay for public or private transport on a single platform using either a service or subscription-based model. Observations of current projects identified two distinct approaches to enabling MaaS: the private-sector approach defined as a “business model,” and the public sector approach that manifests as an “operating model.” The distinction between these models is significant. MaaS provides a unique opportunity for the public sector to set and achieve public policy goals by leveraging emerging technologies in favor of the public good. Common policy goals that relate to transportation include equity and access considerations, environmental impact, congestion mitigation, and so forth. Strategies to address these policy goals include behavioral incentivization and infrastructure reallocation. This study substantiates two models for implementing MaaS and expanding on the public sector approach, to enable policy in favor of the public good.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


2013 ◽  
Vol 64 (2) ◽  
Author(s):  
Seng Chee Lim ◽  
Ahmad Suhaimi Baharudin

The powerful of Internet has changed the world. The successful story from Amazon.com has encouraged some business owners to switch their business model to e-business model. In year 1997, Malaysia's government allocated some budget to setup Internet infrastructure and introduce Multimedia Super Corridor (MSC) to public. The main objective is to transform current practice to service based platform, and to attract world class companies while grooming local Internet communication technologies (ICT) companies. Besides that, the government had put efforts to increase Internet user population such as taxes deduction for family who purchase computers, educate the public the importance of master Internet technologies. After a decade of implementation, the e-Commerce adoption response from the Small Medium Enterprises (SMEs) still do not reach the considerable level, based on Association Chinese Chamber of Commerce & Industries of Malaysia SME's survey it shows 28% of the respondents involve into e-Commerce activities. Small Medium Enterprises contribute 99.2% to Malaysia's economic. This study intends to find out the level of e-Commerce adoption among SMEs in Malaysia, and potential factors that hindrance to the e-Commerce adoption.


2017 ◽  
Vol 26 ◽  
Author(s):  
Matthew Kelly

A new model of the public library is outlined that explicitly links it to its role in support of civil society. The model argues that the ongoing “chaining” of public libraries to direct government oversight and control is deleterious to their ability to actualize their potential. Collateral argument is made that that it is the civil society character rather than the simply free nature of these libraries which needs to be harnessed to help move the conceptualization of the sector away from a reactive model of client service toward a dynamic approach that integrates with the life experiences of clients.


2018 ◽  
Author(s):  
Peter M. Shane

This critique of Karson K. Thompson’s note, "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate," argues that the U.S. lacks a framework of laws and regulations, "smart" or otherwise, that adequately incentivizes the parties with the greatest capacity to improve our cyber security to do so. It attributes the poor state of U.S. cyber policy to the "bewildering array of overlapping responsibilities" scattered among government offices and departments; the difficult imperative of sharing responsibility among military and civilian authorities; the fact that most of the networks (and the dependent critical infrastructures) that need protecting are in private hands; and the lack of public understanding of the kinds of regulation that are necessary or appropriate. The essay argues that meaningful progress towards an adequate legal framework depends on a broad national debate aimed at defining the public good with regard to cyber-security, and the inevitable trade-offs among security, privacy, productivity, economic growth, organizational flexibility, military effectiveness, government transparency, and accountability that must be confronted in making sensible cyber-security policy.


SEEU Review ◽  
2020 ◽  
Vol 15 (1) ◽  
pp. 71-85
Author(s):  
Adrian Besimi ◽  
Visar Shehu

Abstract In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt new technologies. This paper aims to bridge together the needs for technology during the COVID-19 pandemics versus the security challenges that many forget to mention. The primary focus of this paper is to elaborate on the security challenges associated with technology with several examples from incidents around the world and from North Macedonia. As such, it represents a perspective paper with focus on current and emerging advances on IT security for running the “new normal” world.


2021 ◽  
Vol 45 (3) ◽  
pp. 232-255
Author(s):  
Bernd Wirtz ◽  
Paul Langer ◽  
Florian Schmidt

Rapid advances and the spread of digital technologies have changed the expectations of citizens, firms and organizations towards government services, which increasingly receive the call to transform services and structures according to changed needs and preferences. The concept of business model development provides a suitable approach for public institutions aiming at adjusting their services and operations. Since government institutions increasingly develop new services and products, this study provides a theoretic foundation to operational readiness as well as a guideline how to set up digital business models in a public sector context. Therefore, a framework is derived from conceptual studies in the field as well as related theoretical concepts such as business model theory in the public sector context, dynamic capacities and public value creation. Building on this foundation this study conceptualizes a process of business model development to create user oriented digital services in the public sector.


Sign in / Sign up

Export Citation Format

Share Document