Modelling physical impact of cyber attacks

Author(s):  
Antoine Lemay ◽  
Jose Fernandez ◽  
Scott Knight
2019 ◽  
Vol 25 (3) ◽  
pp. 500-513
Author(s):  
P.V. Revenkov ◽  

2018 ◽  
Vol 24 (3) ◽  
pp. 629-640
Author(s):  
P.V. Revenkov ◽  
◽  
A.A. Berdyugin ◽  

2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


Author(s):  
O. Semenenko ◽  
O. Vodchyts ◽  
V. Koverga ◽  
R. Lukash ◽  
O. Lutsenko

The introduction and active use of information transmission and storage systems in the Ministry of Defense (MoD) of Ukraine form the need to develop ways of guaranteed removal of data from media after their use or long-term storage. Such a task is an essential component of the functioning of any information security system. The article analyzes the problems of guaranteed destruction of information on magnetic media. An overview of approaches to the guaranteed destruction of information on magnetic media of different types is presented, and partial estimates of the effectiveness of their application are given by some generally accepted indicators of performance evaluation. The article also describes the classification of methods of destruction of information depending on the influence on its medium. The results of the analysis revealed the main problems of application of software methods and methods of demagnetization of the information carrier. The issue of guaranteed destruction of information from modern SSD devices, which are actively used in the formation of new systems of information accumulation and processing, became particularly relevant in the article. In today's conditions of development of the Armed Forces of Ukraine, methods of mechanical and thermal destruction are more commonly used today. In the medium term, the vector of the use of information elimination methods will change towards the methods of physical impact by the pulsed magnetic field and the software methods that allow to store the information storage device, but this today requires specialists to develop new ways of protecting information in order to avoid its leakage.


2018 ◽  
Author(s):  
Anil Lamba ◽  
Satinderjeet Singh ◽  
Balvinder Singh ◽  
Natasha Dutta ◽  
Sivakumar Sai Rela Muni

Sign in / Sign up

Export Citation Format

Share Document