Cyber Security Concerns Regarding Federated, Partly IMA and Full IMA Implementations

Author(s):  
Arman Uncu ◽  
Serdar Uzumcu ◽  
Abdullah Aykut Mert
Author(s):  
Alya Geogiana Buja

This paper proposes cybersecurity features in the National e-Learning policy. Cybersecurity in the learning environment is becoming an issue that has been considered by the community.  DePAN 1.0 and DePAN 2.0 policies have not been carefully planned in any related security concerns. Amongst security domains in e-learning are authentication and accountability, access control, and non-repudiation issues. However, as the functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid the loss of its confidentiality, integrity, and availability. Therefore, the existing policy and guidelines on e-learning have been studied thoroughly.  A very feasible study has been conducted on the existing literature and related works to e-learning and e-learning.  The security threats are also reviewed in this paper.  Based on the established e-Learning policy, therefore, the proposed security features are namely (CSF1) authentication and accountability, (CSF2) access control, (CSF3) protection of communication, and (CSF4) non-repudiation issues.  The findings from this study can be added to the implementation of e-learning in the future.


2011 ◽  
Vol 2011 ◽  
pp. 1-8 ◽  
Author(s):  
Swapna Iyer

The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with.


Author(s):  
Sattar J. Aboud

Cyber security is the significant issue for customers, sellers, and discipliners since hackers who utilize vulnerabilities can make considerable damage. In this chapter, we study key topics in a nascent literature on a cyber security. We first concentrate on how inducements influence the major topics in information security. Three significant topics pertinent for a cyber security concerns are: an exterior security, the internet consequence and information sharing which make effect in the information security. The budding literature has started to study the relationships between vulnerability revelation, patching, manufactured goods prices and profits.


Subject Outlook for digital healthcare. Significance Though the idea of digital healthcare has been discussed for decades, it has shown promise for rapid growth only recently. A trend is emerging towards consumer-facing and preventive healthcare. This goes in tandem with the development of technological applications. Flourishing venture capital (VC) funding geared towards consumer- and provider-facing applications has flushed the market. Impacts Savvy players should benefit from expanding offerings in the growing industry of digital healthcare over the coming decade. Cyber security will be key to the sector's expansion; in 2015 one in three US patients' healthcare data were hacked. While security concerns must be heeded, they are not a reason to look away from the digital healthcare market.


Author(s):  
Ezer Osei Yeboah-Boateng

Information is modeled into virtual objects to create value for its owner. The value chain involves stakeholders with varied responsibilities in the cyber-market. Cloud computing emerged out of virtualization, distributed and grid computing, and has altered the value creation landscape, through strategic and sensitive information management. It offers services that use resources in a utility fashion. The flexible, cost-effective service models are opportunities for SMEs. Whilst using these tools for value-creation is imperative, a myriad of security concerns confront both providers and end-users. Vulnerabilities and threats are key concerns, so that value created is strategically aligned with corporate vision, appropriated and sustained. What is the extent of impact? Expert opinions were elicited of 4 C-level officers and 10 security operatives. Shared technology issues, malicious insiders and service hijacking are considered major threats. Also, an intuitive strategic model for Value-Creation Cloud-based Cyber-security is proposed as guidance in fostering IT-enabled initiatives.


2018 ◽  
Vol 52 (5) ◽  
pp. 44-57 ◽  
Author(s):  
Phil McGillivary

AbstractMaritime cybersecurity is developing as an issue that affects the ocean. Recent security breaches cost shipping companies hundreds of millions of dollars and put marine ecosystems at risk by disabling ship controls and increasing risks of collisions and hazmat spills. Additionally, most new ships are designed to transmit engine performance data ashore to allow timely maintenance and efficient operation. However, many ships still prohibit such data transmission due to security concerns, resulting in increased ship emissions and environmental risks from accidental release of oil, hydraulic fluids, or lubricants. Similarly, research vessel data are routinely sent ashore, but security concerns for their computers are also increasing, especially when they operate in global ports and oceans. Maritime cybersecurity is also critical as autonomous ships are being developed. Addressing maritime cybersecurity is therefore a valid area of scientific policy research and important for ocean science operations.The International Maritime Organization (IMO) has called for improved maritime cybersecurity, and the U.S. Coast Guard also recently released a Navigation and Vessel Inspection Circular (NVIC; NVIC 05-17) on maritime cybersecurity for comments. The newly established Maritime Cyber Security Committee of the Marine Technology Society is coordinating maritime cybersecurity best practice information, contacts for cybersecurity professionals, and lessons learned on responding to cyberattacks to make this information broadly available. We review here various stakeholder approaches to maritime cybersecurity, outline available resources, and discuss how advanced methods, including optical communications and quantum encryption, will improve maritime cybersecurity. Scientists have a role in developing and implementing maritime cybersecurity methods and policies to ensure safe ship operations and improved environmental security for the oceans.


Sign in / Sign up

Export Citation Format

Share Document