Computing the impact of cyber attacks on complex missions

Author(s):  
Scott Musman ◽  
Mike Tanner ◽  
Aaron Temin ◽  
Evan Elsaesser ◽  
Lewis Loren
Keyword(s):  
2020 ◽  
Vol 11 (1) ◽  
pp. 285
Author(s):  
Runze Wu ◽  
Jinxin Gong ◽  
Weiyue Tong ◽  
Bing Fan

As the coupling relationship between information systems and physical power grids is getting closer, various types of cyber attacks have increased the operational risks of a power cyber-physical System (CPS). In order to effectively evaluate this risk, this paper proposed a method of cross-domain propagation analysis of a power CPS risk based on reinforcement learning. First, the Fuzzy Petri Net (FPN) was used to establish an attack model, and Q-Learning was improved through FPN. The attack gain was defined from the attacker’s point of view to obtain the best attack path. On this basis, a quantitative indicator of information-physical cross-domain spreading risk was put forward to analyze the impact of cyber attacks on the real-time operation of the power grid. Finally, the simulation based on Institute of Electrical and Electronics Engineers (IEEE) 14 power distribution system verifies the effectiveness of the proposed risk assessment method.


2021 ◽  
Vol 13 (12) ◽  
pp. 6750
Author(s):  
Andreja Mihailović ◽  
Julija Cerović Smolović ◽  
Ivan Radević ◽  
Neli Rašović ◽  
Nikola Martinović

The main idea of this research is to examine how teleworking has affected employee perceptions of organizational efficiency and cybersecurity before and during the COVID-19 pandemic. The research is based on an analytical and empirical approach. The starting point of the research is a critical and comprehensive analysis of the relevant literature regarding the efficiency of organizations due to teleworking, digital information security, and cyber risk management. The quantitative approach is based on designing a structural equation model (SEM) on a sample of 1101 respondents from the category of employees in Montenegro. Within the model, we examine simultaneously the impact of their perceptions on the risks of teleworking, changes in cyber-attacks during teleworking, organizations’ capacity to respond to cyber-attacks, key challenges in achieving an adequate response to cyber-attacks, as well as perceptions of key challenges related to cybersecurity. The empirical aspects of our study involve constructing latent variables that correspond to different elements of employee perception; namely, their perception of organizational efficiency and the extent to which the digital information security of their organizations has been threatened during teleworking during the pandemic.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


Author(s):  
Alika Guchua

Abstract: The article deals with new type of asymmetric warfare and hybrid war. The potential threats in international politics and global security issues, Euro-Atlantic Alliance policy of fighting against terrorism. A serious challenge to modern security creates many problems around the world. The beginning of the twenty-first century was marked by proliferation of hybrid wars, held between flexible and sophisticated adversaries engaged in asymmetric conflicts using various forms. The hybrid war is caused by a hybrid threat, a blend of military and non-military assets and operations, terrorism, guerrilla tactics, criminality and cyber attacks. The use of hybrid type tactics can ensure the achievement of the main objectives of an international actor, with a minimum of effort, usually without using the force, and can deny to the target/victim the possibility to take any defensive actions. The complexity, diversity, the nature and dynamics of contemporary conflicts represent challenges that should be widely studied. The war, be it ancient or modern, hybrid or not, is always complex and cannot be described by a single adjective. The work focuses on the role of NATO in ensuring peace worldwide in the context of new asymmetric threats. The aim of the research topic: analyzing global challenges, which pose a serious threat to international security.


Author(s):  
Srijith Balakrishnan ◽  
Zhanmin Zhang

Unanticipated events such as natural disasters, terrorist attacks, cyber-attacks, and so forth, could cause prolonged disruptions in major utility service networks including, for example, water and electricity, in urban areas. Owing to the presence of complex interdependencies among infrastructure systems in an urban network, the disruption of one system may trigger a chain of events that degrades the proper functioning of several other dependent systems. Consequently, many parts of the city may not have access to multiple utility services and amenities. Identifying the most vulnerable communities exposed to such utility disruptions is key to performing immediate relief operations. In this paper, the concept of Priority Index, introduced as a measure of the susceptibility of communities to the event, is presented to rank urban regions based on the extent of the impact of disruptions (both cascading and interdependent impacts) caused by an event, as well as the social vulnerability of communities. Agent-based models are employed to simulate the consequences of a disruptive event on a semi-realistic urban infrastructure network. Later, the extent of impact on communities is evaluated using the simulation results and the American Community Survey data. The proposed Priority Index could help city administrations and utility service agencies identify the regions in a city that require immediate attention after a disruptive event occurs in the infrastructure network. A case study based on a semi-realistic infrastructure network in Austin, Texas is presented to demonstrate the implementation of the concept of Priority Index and the methodological framework.


2021 ◽  
Vol 62 (01) ◽  
pp. 141-146
Author(s):  
Gulnaz Tahir Hasanova ◽  

This study aims to highlight the growing strategic importance that cyberspace is gaining in the dynamics of international politics. After land, sea, air, and outer space, cyberspace is the fifth dimension of conflict. The type of non-military weapons used to fight, as well as the subjects targeted, make civilian systems new centers of gravity to defend against an enemy that most often "operates in the shadows." The international scenario rmation revolution (which contributed to the "democratization of information"), is radically evolving from a unipolar (American-led) to an almost multipolar architecture. The Internet today is an indispensable communication and information network for various legal and illegal subjects of international relations. Social networks (Facebook, Twitter, Telegram) play a very important role in this process. The Internet can also allow manipulation or even destabilization of the international community with the spread of false information (fake news). It is also a field for intelligence activities. Finally, the Internet is becoming the field of a new form of confrontation. Thus, both states and private actors protect themselves from possible cyber attacks by developing cybersecurity. In anticipation of this, states are developing cyberspace strategies and military-digital capabilities. Key words: international relations, information, cyberspace, cybersecurity, territorial integrity, state, subjects of international relations, information warfare


Author(s):  
Ibtissam Kharchouf ◽  
Ahmed Saad ◽  
Abdulmueen Alrashide ◽  
Osama A. Mohammed
Keyword(s):  

Author(s):  
Quinn E. Lanzendorfer

Cyber-attacks happen faster and more spontaneously than traditional warfare. This cyber landscape offers new challenges to organizations due to its unique nature. Building organizations to defend against cyber terrorism and innovating offensive solutions calls for strong information sharing amongst government and military organizations, as well as industry partners. Using an innovative electronic method to collect quantitative and qualitative data from experts, this study seeks to explore the effectiveness and establishment of information sharing practices and procedures in U.S. government cybersecurity organizations. This study also considers the impact of media leaks and terrorism on information sharing practices and procedures.


Sign in / Sign up

Export Citation Format

Share Document