Cybersecurity Teamwork: A Review of Current Practices and Suggested Improvements

Author(s):  
Richard J. Simonson ◽  
Joseph R. Keebler ◽  
Mathew Lessmiller ◽  
Tyson Richards ◽  
John C. Lee

As cyber-attacks and their subsequent responses have become more frequent and complex over the past decade, research into the performance and effectiveness of cybersecurity teams has gained an immense amount of traction. However, investigation of teamwork in this domain is lacking due to the exclusion of known team competencies and a lack of reliance on team science. This paper serves to provide insight into the benefit that can be gained from utilizing the extant teamwork literature to improve teams’ research and applications in the domain of cyber-security.

Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2016 ◽  
Vol 6 (3) ◽  
pp. 79-95
Author(s):  
Suhaila Ismail ◽  
Elena Sitnikova ◽  
Jill Slay

Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.


TAPPI Journal ◽  
2015 ◽  
Vol 14 (1) ◽  
pp. 51-60
Author(s):  
HONGHI TRAN ◽  
DANNY TANDRA

Sootblowing technology used in recovery boilers originated from that used in coal-fired boilers. It started with manual cleaning with hand lancing and hand blowing, and evolved slowly into online sootblowing using retractable sootblowers. Since 1991, intensive research and development has focused on sootblowing jet fundamentals and deposit removal in recovery boilers. The results have provided much insight into sootblower jet hydrodynamics, how a sootblower jet interacts with tubes and deposits, and factors influencing its deposit removal efficiency, and have led to two important innovations: fully-expanded sootblower nozzles that are used in virtually all recovery boilers today, and the low pressure sootblowing technology that has been implemented in several new recovery boilers. The availability of powerful computing systems, superfast microprocessors and data acquisition systems, and versatile computational fluid dynamics (CFD) modeling capability in the past two decades has also contributed greatly to the advancement of sootblowing technology. High quality infrared inspection cameras have enabled mills to inspect the deposit buildup conditions in the boiler during operation, and helped identify problems with sootblower lance swinging and superheater platens and boiler bank tube vibrations. As the recovery boiler firing capacity and steam parameters have increased markedly in recent years, sootblowers have become larger and longer, and this can present a challenge in terms of both sootblower design and operation.


2020 ◽  
Vol 15 ◽  
Author(s):  
Geeta Aggarwal ◽  
Manju Nagpal ◽  
Ameya Sharma ◽  
Vivek Puri ◽  
Gitika Arora Dhingra

Background: Biopharmaceuticals such as Biologic medicinal products have been in clinical use over the past three decades and have benefited towards the therapy of degenerative and critical metabolic diseases. It is forecasted that market of biologics will be going to increase at a rate of 20% per year, and by 2025, more than ˃ 50% of new drug approvals may be biological products. The increasing utilization of the biologics necessitates for cost control, especially for innovators products that have enjoyed a lengthy period of exclusive use. As the first wave of biopharmaceuticals is expired or set to expire, it has led to various opportunities for the expansion of bio-similars i.e. copied versions of original biologics with same biologic activity. Development of biosimilars is expected to promote market competition, meet worldwide demand, sustain the healthcare systems and maintain the incentives for innovation. Methods: Appraisal of published articles from peer reviewed journals, PubMed literature, latest news and guidelines from European Medicine Agency, US Food Drug Administration (FDA) and India are used to identify data for review. Results: Main insight into the quality requirements concerning biologics, current status of regulation of biosimilars and upcoming challenges lying ahead for the upgrading of marketing authorization of bio-similars has been incorporated. Compiled literature on therapeutic status, regulatory guidelines and the emerging trends and opportunities of biosimilars has been thoroughly stated. Conclusion: Updates on biosimilars will support to investigate the possible impact of bio-similars on healthcare market.


2021 ◽  
Vol 26 ◽  
Author(s):  
T. Berry ◽  
J. Sharpe

Abstract This paper introduces and demonstrates the use of quantum computers for asset–liability management (ALM). A summary of historical and current practices in ALM used by actuaries is given showing how the challenges have previously been met. We give an insight into what ALM may be like in the immediate future demonstrating how quantum computers can be used for ALM. A quantum algorithm for optimising ALM calculations is presented and tested using a quantum computer. We conclude that the discovery of the strange world of quantum mechanics has the potential to create investment management efficiencies. This in turn may lead to lower capital requirements for shareholders and lower premiums and higher insured retirement incomes for policyholders.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Author(s):  
Abigail R. Wooldridge ◽  
Rod D. Roscoe ◽  
Rod D. Roscoe ◽  
Shannon C. Roberts ◽  
Rupa Valdez ◽  
...  

The Diversity Committee of HFES has led sessions at the Annual Meeting for the past three years focused on improving diversity, equity and inclusion in the society as well as providing support to human factors and ergonomics (HF/E) researchers and practitioners who aim to apply HF/E knowledge and principles to improve diversity, equity and inclusion through their work. In this panel, we bring together researchers actively engaged in designing technology and systems by considering issues of diversity, equity and inclusion to share insights and methods. Topics include the thoughtful design of sampling strategies and research approaches, alternative and participatory methods to understand the impact of automation and technology on equity, scoping design problems to be inclusive and equitable through interdisciplinary partnerships, and the application of sociotechnical system design and team science to develop interdisciplinary teams. By sharing our experiences, we hope to prepare others to successfully approach these topics.


Molecules ◽  
2020 ◽  
Vol 25 (5) ◽  
pp. 1059 ◽  
Author(s):  
Khadija El Hazzam ◽  
Jawhar Hafsa ◽  
Mansour Sobeh ◽  
Manal Mhada ◽  
Moha Taourirte ◽  
...  

Saponins are an important group found in Chenopodium quinoa. They represent an obstacle for the use of quinoa as food for humans and animal feeds because of their bitter taste and toxic effects, which necessitates their elimination. Several saponins elimination methods have been examined to leach the saponins from the quinoa seeds; the wet technique remains the most used at both laboratory and industrial levels. Dry methods (heat treatment, extrusion, roasting, or mechanical abrasion) and genetic methods have also been evaluated. The extraction of quinoa saponins can be carried out by several methods; conventional technologies such as maceration and Soxhlet are the most utilized methods. However, recent research has focused on technologies to improve the efficiency of extraction. At least 40 saponin structures from quinoa have been isolated in the past 30 years, the derived molecular entities essentially being phytolaccagenic, oleanolic and serjanic acids, hederagenin, 3β,23,30 trihydroxy olean-12-en-28-oic acid, 3β-hydroxy-27-oxo-olean-12en-28-oic acid, and 3β,23,30 trihydroxy olean-12-en-28-oic acid. These metabolites exhibit a wide range of biological activities, such as molluscicidal, antifungal, anti-inflammatory, hemolytic, and cytotoxic properties.


Sign in / Sign up

Export Citation Format

Share Document