An Analysis of Cyber Security Attack Taxonomies

Author(s):  
Richard Derbyshire ◽  
Benjamin Green ◽  
Daniel Prince ◽  
Andreas Mauthe ◽  
David Hutchison
Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Author(s):  
Y.Chandra Sekhar Reddy ◽  
M.Venkateswara Rao ◽  
M. Kameswara Rao ◽  
C.V. Phaneendra Kumar ◽  
A. Anil Sai

In this 21st century one of the main issue to tackle was Cyber Security attack. We have numerous authentication processes like two key factor passwords, graphical passwords and many other. Text based passwords are prone to many attacks like dictionary attacks. In this paper, we have implemented a new authentication method namely; a family of graphical passwords built on Captcha technology. As graphical password addresses many security problems like online guessing attacks, relay attacks etc. Captcha is used to distinguish humans and bots. So, we use images with captcha’s as one of the authentication step along with normal alpha-numeric password. It also overcome the problems of pass points in graphical password systems.


2020 ◽  
Vol 15 (6) ◽  
pp. 1698-1706
Author(s):  
Damla Karagozlu

As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study is to determine the behaviours of pre-service teachers as this study’s objective is to determine the behaviours of pre-service teachers regarding cyber security. This study is designed according to the quantitative research method and the Personal Cyber Security Ensuring Scale has been used. 144 pre-service teachers of two different universities who took up instructional technologies and material design courses in the 2019–2020 spring semester participated in the study. It has been observed that the participants frequently took measures when they noticed unreliable people and situations in the internet environment but took occasional measures in terms of not leaving any trace, taking precautions and protecting personal privacy.   Keywords: Cyber attack, cyber security, personal cyber security, pre-service teachers


2018 ◽  
Vol 79 ◽  
pp. 117-131 ◽  
Author(s):  
Harjinder Singh Lallie ◽  
Kurt Debattista ◽  
Jay Bal

2012 ◽  
Author(s):  
Michael McNeese ◽  
Nancy J. Cooke ◽  
Anita D'Amico ◽  
Mica R. Endsley ◽  
Cleotilde Gonzalez ◽  
...  
Keyword(s):  

CICTP 2017 ◽  
2018 ◽  
Author(s):  
Haojie Ji ◽  
Guizhen Yu ◽  
Yunpeng Wang ◽  
Zhao Zhang ◽  
Hongmao Qin

Sign in / Sign up

Export Citation Format

Share Document