Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?

Author(s):  
Premkumar Chithaluru ◽  
Rohit Tanwar ◽  
Sunil Kumar
Keyword(s):  
2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Fabrizio Bertone ◽  
Francesco Lubrano ◽  
Klodiana Goga

Energy is one of the main elements that allows society to maintain its living standards and continue as usual. For this reason, the energy distribution is both one of the most important and targeted by attacks Critical Infrastructure. Many of the other Critical Infrastructures rely on energy to work reliably. Some states are particularly interested in getting stealth access to -and take control of- energy production and distribution of other Nations. This way they can create huge disruption and get a significant advantage in case of conflict. In the recent past, we could observe some real-life demonstrations of this fact. The introduction of smart grids and ICT in the management of energy infrastructures has great benefits but also introduces new attack surfaces and ways for attackers to gain control. As a benefit, we can also collect more data and metrics to better understand the state of the grid. New techniques based on Artificial Intelligence and machine learning can take advantage of the available data to help the protection of the infrastructures and detect ongoing threats. Smart Meters which are connected intelligent devices spread over the grid and the geographical distribution of the population. For this reason, they can be very useful data collection assets but also a target for attack. In this paper, the authors consider and analyze various innovative techniques that can be used to enhance the security and reliability of Smart Grids.


2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Monica Canepa ◽  
Fabio Ballini ◽  
Dimitrios Dalaklis ◽  
Seyedvahid Vakili ◽  
Luis Miguel Colmenares Hernandez

Cybersecurity is now considered as one of the main challenges for the maritime sector. At the same time, the maritime transport industry remains one of the most relevant and driving sectors for the global economy in terms of both the number and operations of active companies, and infrastructure and investments, thanks to the policies pushed to attract the latter. Maritime information systems, whether on board ships or in ports, are numerous, built with standard components available on the market and in many cases designed without factoring in well the ever-growing cyber risk. Digital infrastructure has become essential in operating and managing systems critical to the safety and security of shipping and ports. Specifically, Cyber-MAR is focused upon the simulation and emulation of the real world of maritime systems (e.g. Logistics, Supply Chain). This research effort will examine the creation of a federated Cyber Range (CR Cyber-MAR) which will include various platforms and interconnected systems on board a vessel or ashore, in order to allow a hyper-realistic simulation of cyber-attacks and trying to assimilate them into real-life. Then the identified CR Cyber range will be integrated in the Cybersecurity training needs for different levels of operators. The investigation of the discussed topic will essentially use qualitative techniques, analysing data obtained from publications, official and commercial reports, and interviews of a targeted audience.


2021 ◽  
Vol 2 (3) ◽  
pp. 1-23
Author(s):  
Josephine Lamp ◽  
Carlos E. Rubio-Medrano ◽  
Ziming Zhao ◽  
Gail-Joon Ahn

No longer just prophesied about, cyber-attacks to Energy Delivery Systems (EDS) (e.g., the power grid, gas and oil industries) are now very real dangers that result in non-trivial economical losses and inconveniences to modern societies. In such a context, risk analysis has been proposed as a valuable way to identify, analyze, and mitigate potential vulnerabilities, threats, and attack vectors. However, performing risk analysis for EDS is difficult due to their innate structural diversity and interdependencies, along with an always-increasing threatscape. Therefore, there is a need for a methodology to evaluate the current system state, identify vulnerabilities, and qualify risk at multiple granularities in a collaborative manner among different actors in the context of EDS. With this in mind, this article presents ExSol , a collaborative, real-time, risk assessment ecosystem that features an approach for modeling real-life EDS infrastructures, an ontology traversal technique that retrieves well-defined security requirements from well-reputed documents on cyber-protection for EDS infrastructures, as well as a methodology for calculating risk for a single asset and for an entire system. Moreover, we also provide experimental evidence involving a series of attack scenarios in both simulated and real-world EDS environments, which ultimately encourage the adoption of ExSol in practice.


2019 ◽  
Vol 9 (13) ◽  
pp. 2763 ◽  
Author(s):  
Jose Costa Sapalo Sicato ◽  
Pradip Kumar Sharma ◽  
Vincenzo Loia ◽  
Jong Hyuk Park

Recently, the development of smart home technologies has played a crucial role in enhancing several real-life smart applications. They help improve the quality of life through systems designed to enhance convenience, comfort, entertainment, health of the householders, and security. Note, however, that malware attacks on smart home devices are increasing in frequency and volume. As people seek to improve and optimize comfort in their home and minimize their daily home responsibilities at the same time, this makes them attractive targets for a malware attack. Thus, attacks on smart home-based devices have emerged. The goals of this paper are to analyze the different aspects of cyber-physical threats on the smart home from a security perspective, discuss the types of attacks including advanced cyber-attacks and cyber-physical system attacks, and evaluate the impact on a smart home system in daily life. We have come up with a taxonomy focusing on cyber threat attacks that can also have potential impact on a smart home system and identify some key issues about VPNFilter malware that constitutes large-scale Internet of Things (IoT)-based botnet malware infection. We also discuss the defense mechanism against this threat and mention the most infected routers. The specific objective of this paper is to provide efficient task management and knowledge related to VPNFilter malware attack.


2021 ◽  
Vol 11 (14) ◽  
pp. 6540
Author(s):  
Nader Aljohani ◽  
Arturo Bretas

Power system state estimation is an important component of the status and healthiness of the underlying electric power grid real-time monitoring. However, such a component is prone to cyber-physical attacks. The majority of research in cyber-physical power systems security focuses on detecting measurements False-Data Injection attacks. While this is important, measurement model parameters are also a most important part of the state estimation process. Measurement model parameters though, also known as static-data, are not monitored in real-life applications. Measurement model solutions ultimately provide estimated states. A state-of-the-art model presents a two-step process towards simultaneous false-data injection security: detection and correction. Detection steps are χ2 statistical hypothesis test based, while correction steps consider the augmented state vector approach. In addition, the correction step uses an iterative solution of a relaxed non-linear model with no guarantee of optimal solution. This paper presents a linear programming method to detect and correct cyber-attacks in the measurement model parameters. The presented bi-level model integrates the detection and correction steps. Temporal and spatio characteristics of the power grid are used to provide an online detection and correction tool for attacks pertaining the parameters of the measurement model. The presented model is implemented on the IEEE 118 bus system. Comparative test results with the state-of-the-art model highlight improved accuracy. An easy-to-implement model, built on the classical weighted least squares solution, without hard-to-derive parameters, highlights potential aspects towards real-life applications.


2018 ◽  
Vol 26 (26) ◽  
pp. 160-172
Author(s):  
M. Kubilay Akman

When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks, terrorism, identity theft, ransomwares and so on. Even “old types” of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security’s prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.


Legal Ukraine ◽  
2020 ◽  
pp. 14-29
Author(s):  
Mariana Zhuravel

Dependency on global cyberspace is rapidly increasing nowadays. Virtual reality generates opportunities for enterprises, governments and individuals; however it also poses significant threats to security on different levels including the national level, whereby key state infrastructures can become a target of cyber attacks. This was seen during the Covid-19 pandemic when the healthcare system in a number of countries experienced cyber threats, which in the example of the Czech Republic, led to severe disruption of the medical processes in a hospital. Thus, cybercrime can cause detrimental effects not only to individuals or business entities, but also to a large group of stakeholders. Infinite cyberspace, the anonymous character of cyber attackers, advances in technology and a lack of cyber security measures in place – these all give cybercrime a sophisticated and aggressive nature and as a result, make us more vulnerable to it. This article will consider different categories of cybercrime, namely, crimes against the person; crimes against property, and crimes against the government, drawing examples from real life cases. This will be followed by an exploration of the methods which should be employed in the fight against cybercrime. In addition, the EU legislative framework will be considered as an example of legal measures against cybercrime. Key words: Internet, cyberspace, cybercrime, cyber attack, cyber threat, cybersecurity, ransomware, cyber terrorism, European Union legal framework, NIS Directive, ENISA, ways.


Chapter 5 examines issues currently being encountered in the Middle East that demonstrate a cross-over between electronic warfare and cyber-warfare activities, affecting not only typical targets over the internet but also ships, aircraft, and unmanned aerial vehicles during the second decade of the new millennium. This overview provides examples of how cyber-warfare techniques are now being used in the battle space domain to affect geo-political situations within regions. The evidence shows how the cyber domain can influence real-life situations, taking its capabilities progressively just that one step further to hacker and state-sponsored cyber-attacks already witnessed against ICS cyber-physical assets. The viewpoint here draws upon historical stimuli and escalating political tensions now being encountered by opposing nations that could have a wider reaching impact.


2020 ◽  
Vol 48 (2) ◽  
pp. 399-409
Author(s):  
Baizhen Gao ◽  
Rushant Sabnis ◽  
Tommaso Costantini ◽  
Robert Jinkerson ◽  
Qing Sun

Microbial communities drive diverse processes that impact nearly everything on this planet, from global biogeochemical cycles to human health. Harnessing the power of these microorganisms could provide solutions to many of the challenges that face society. However, naturally occurring microbial communities are not optimized for anthropogenic use. An emerging area of research is focusing on engineering synthetic microbial communities to carry out predefined functions. Microbial community engineers are applying design principles like top-down and bottom-up approaches to create synthetic microbial communities having a myriad of real-life applications in health care, disease prevention, and environmental remediation. Multiple genetic engineering tools and delivery approaches can be used to ‘knock-in' new gene functions into microbial communities. A systematic study of the microbial interactions, community assembling principles, and engineering tools are necessary for us to understand the microbial community and to better utilize them. Continued analysis and effort are required to further the current and potential applications of synthetic microbial communities.


2010 ◽  
Vol 11 (2) ◽  
pp. 60-65
Author(s):  
Francine Wenhardt

Abstract The speech-language pathologist (SLP) working in the public schools has a wide variety of tasks. Educational preparation is not all that is needed to be an effective school-based SLP. As a SLP currently working in the capacity of a program coordinator, the author describes the skills required to fulfill the job requirements and responsibilities of the SLP in the school setting and advises the new graduate regarding the interview process and beginning a career in the public schools.


Sign in / Sign up

Export Citation Format

Share Document