Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar

Author(s):  
Wai Phyo Aung ◽  
Htar Htar Lwin ◽  
Kyaw Kyaw Lin
2022 ◽  
pp. 1459-1480
Author(s):  
Anand Nayyar ◽  
Rachna Jain ◽  
Bandana Mahapatra ◽  
Anubhav Singh

Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.


Author(s):  
K. Janani ◽  

Cybersecurity is a technique that entails security models development techniques to the illegal access, modification, or destruction of computing resources, networks, program, and data. Due to tremendous developments in information and communication technologies, new dangers to cyber security have arisen and are rapidly changing. The creation of a Deep Learning system requires a substantial number of input samples and it can take a great deal of time and resources to gather and process the samples. Building and maintaining the basic system requires a huge number of resources, including memory, data and computational power. In this paper, we develop an Ensemble Deep Belief Networks to classify the cybersecurity threats in large scale network. An extensive simulation is conducted to test the efficacy of model under different security attacks. The results show that the proposed method achieves higher level of security than the other methods.


Author(s):  
Muhammad Mudassar YAMIN ◽  
Basel KATT

The field of cyber security is getting diversified day by day, with new specialist responsibilities and roles at different levels of competence being required by the industry. The competencies can be mapped with required skills set in multiple cyber security certification programs. However, different certification programs use different curricula and terminology, which makes the offerings overlap in some aspect and be distinct in others. This makes it hard for new institutes and cyber ranges to decide upon their training offerings. The aim of this study is to identify commonalities in skill set requirement for multiple cyber security roles like penetration tester, security operation center analysts, digital forensic and incident responders and information security managers. The identified commonalities will be used for development of a standard common curricula to set skill set requirement for the achievement of specific competence levels in a specific cyber security field.


Author(s):  
Nagarajan Venkatachalam ◽  
Peadar O'Connor ◽  
Shailesh Palekar

Cybersecurity is a critical consideration for all users of electronic health records (EHR), particularly for patients. With the advent of Healthcare 4.0, which is based on the internet of things (IoT) and sensors, cyber resilience has become a key requirement in ensuring the protection of patient data across devices. Blockchain offers crypto-enforced security, data immutability, and smart contracts-based business logic features to all the users in the network. This study explores how blockchain can be a single digital option that can address both the cybersecurity and cyber resilience needs of EHR. The effective use lens is adopted to analyze how blockchain can be leveraged to meet cybersecurity needs while the novel use lens is adopted to analyze how blockchain can be leveraged to address cyber resilience needs originating from IoT. Based on the analysis, this study proposes two Hyperledger-based security models that contribute to individual privacy and information security needs.


Author(s):  
Anand Nayyar ◽  
Rachna Jain ◽  
Bandana Mahapatra ◽  
Anubhav Singh

Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 87
Author(s):  
Sundresan Perumal ◽  
Sakinah Ali Pitchay ◽  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Pritheega Magalingam ◽  
...  

The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency’s interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies’ information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.  


Author(s):  
Norman F. Schneidewind

Predictive models for estimating the occurrence of cyber attacks are desperately needed to counteract the growing threat of cyber terrorism. Unfortunately, except to a limited degree, there is no genuine database of attacks, vulnerabilities, consequences, and risks to employ for model development and validation. However, it is still useful to provide definitions, equations, plots, and analyses to answer the “what if” questions concerning potentials attacks. We do this by reasoning about the elements of predictive models and their relationships, which are needed to mirror objects and events in the real world of cyberspace. The application of these models is to provide the user with a vehicle for testing hypotheses about how to respond to a cyber attack before it occurs, using risk, vulnerabilities, time between attacks, and intrusion (number and duration) concepts.


Author(s):  
Matt Kiely ◽  
Eric Kobe ◽  
Amanda MacArthur ◽  
Matt Polk ◽  
Eric Rains ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document