scholarly journals How We Stopped Worrying about Cyber Doom and Started Collecting Data

2018 ◽  
Vol 6 (2) ◽  
pp. 49-60 ◽  
Author(s):  
Brandon Valeriano ◽  
Ryan C. Maness

Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field.

Author(s):  
Alya Geogiana Buja

This paper proposes cybersecurity features in the National e-Learning policy. Cybersecurity in the learning environment is becoming an issue that has been considered by the community.  DePAN 1.0 and DePAN 2.0 policies have not been carefully planned in any related security concerns. Amongst security domains in e-learning are authentication and accountability, access control, and non-repudiation issues. However, as the functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid the loss of its confidentiality, integrity, and availability. Therefore, the existing policy and guidelines on e-learning have been studied thoroughly.  A very feasible study has been conducted on the existing literature and related works to e-learning and e-learning.  The security threats are also reviewed in this paper.  Based on the established e-Learning policy, therefore, the proposed security features are namely (CSF1) authentication and accountability, (CSF2) access control, (CSF3) protection of communication, and (CSF4) non-repudiation issues.  The findings from this study can be added to the implementation of e-learning in the future.


2014 ◽  
Vol 41 (3-4) ◽  
pp. 117 ◽  
Author(s):  
William Ramp

Food security is now commonly seen as one of the defining global issues of the century, intertwined with population and consumption shifts, climate change, environmental degradation, water scarcity, and the geopolitics attending globalization. Some analysts suggest that food security threats are so urgent that philosophical scruples must be set aside in order to concentrate all resources on developing and implementing radical strategies to avert a looming civilizational crisis. This article suggests that definitions of food security invoke commitments and have consequences, and that continued critical and conceptual attention to the language employed in food security research and policy is warranted.


Author(s):  
Smt. Ch. Vimala ◽  
Smt. P. Vishalini

Cyber security plays an important role in Information Technology. Securing the information becomes a challenge in present days. The main purpose of cyber security is to protect all organizational assets from threats as well as disruptions caused due to natural disasters. Various governments and companies are taking necessary measurements in order to prevent cybercrimes. Cyber security deals with the “Securing the future- securing the tomorrow’s world”.


2016 ◽  
Vol 5 (1) ◽  
pp. 14 ◽  
Author(s):  
Bharat S Rawal ◽  
Gabrielle Eberhardt ◽  
Jaein Lee

Every day, millions of attacks are carried out on the networks and computer systems. In recent years, these numbers have increased dramatically. All it requires is one success for a hacker to gain unauthorized access and data, but for administrators, it is a constant battle to protect what is rightfully theirs. In this paper, we look into how these attacks have increased, what the studies of various databases and reports say on how and what types of data are being breached, who is breaching them, and how they are breaching the systems. Also, we propose various unconventional ways to prevent these attacks from happening in the future. Furthermore, this paper lists the top 26 bug-fix times reported in the Google Security Research Project (GSRP). This article brings to light reoccurring cyber threats, challenges associated with these threats, and emerging trends in the domain of cyber security.


2015 ◽  
Author(s):  
Whitney Winders ◽  
Cariana Cornel ◽  
Caralea Cornel ◽  
Allie Larson ◽  
Sarah Cunha ◽  
...  

2015 ◽  
Vol 5 (4) ◽  
pp. 59-68
Author(s):  
Matthew D. Gonzalez

The goal of this paper is to investigate international aspects regarding cyber security, cyber war, and terrorism. These aspects are legal issues, social implications, technical parameters, and the ethical bearing. As this article contains research pertaining to the Stuxnet worm and aims to predict the future of cyber war using recent statistics, the journal is most pertinent to this article's contents. Researchers and practitioners alike will reviewthe twenty-first century concept of cyber war which is subtler, yet just as dangerous as traditional confrontation methods.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Author(s):  
Chris Reeves ◽  
Geoff Davis ◽  
David D. Ward ◽  
Tim Edwards ◽  
Alastair R. Ruddle

Sign in / Sign up

Export Citation Format

Share Document